)]}'
{
  "log": [
    {
      "commit": "3b59bf081622b6446db77ad06c93fe23677bc533",
      "tree": "3f4bb5a27c90cc86994a1f6d3c53fbf9208003cb",
      "parents": [
        "e45836fafe157df137a837093037f741ad8f4c90",
        "bbdb32cb5b73597386913d052165423b9d736145"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Mar 20 21:04:47 2012 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Mar 20 21:04:47 2012 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next\n\nPull networking merge from David Miller:\n \"1) Move ixgbe driver over to purely page based buffering on receive.\n     From Alexander Duyck.\n\n  2) Add receive packet steering support to e1000e, from Bruce Allan.\n\n  3) Convert TCP MD5 support over to RCU, from Eric Dumazet.\n\n  4) Reduce cpu usage in handling out-of-order TCP packets on modern\n     systems, also from Eric Dumazet.\n\n  5) Support the IP{,V6}_UNICAST_IF socket options, making the wine\n     folks happy, from Erich Hoover.\n\n  6) Support VLAN trunking from guests in hyperv driver, from Haiyang\n     Zhang.\n\n  7) Support byte-queue-limtis in r8169, from Igor Maravic.\n\n  8) Outline code intended for IP_RECVTOS in IP_PKTOPTIONS existed but\n     was never properly implemented, Jiri Benc fixed that.\n\n  9) 64-bit statistics support in r8169 and 8139too, from Junchang Wang.\n\n  10) Support kernel side dump filtering by ctmark in netfilter\n      ctnetlink, from Pablo Neira Ayuso.\n\n  11) Support byte-queue-limits in gianfar driver, from Paul Gortmaker.\n\n  12) Add new peek socket options to assist with socket migration, from\n      Pavel Emelyanov.\n\n  13) Add sch_plug packet scheduler whose queue is controlled by\n      userland daemons using explicit freeze and release commands.  From\n      Shriram Rajagopalan.\n\n  14) Fix FCOE checksum offload handling on transmit, from Yi Zou.\"\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next: (1846 commits)\n  Fix pppol2tp getsockname()\n  Remove printk from rds_sendmsg\n  ipv6: fix incorrent ipv6 ipsec packet fragment\n  cpsw: Hook up default ndo_change_mtu.\n  net: qmi_wwan: fix build error due to cdc-wdm dependecy\n  netdev: driver: ethernet: Add TI CPSW driver\n  netdev: driver: ethernet: add cpsw address lookup engine support\n  phy: add am79c874 PHY support\n  mlx4_core: fix race on comm channel\n  bonding: send igmp report for its master\n  fs_enet: Add MPC5125 FEC support and PHY interface selection\n  net: bpf_jit: fix BPF_S_LDX_B_MSH compilation\n  net: update the usage of CHECKSUM_UNNECESSARY\n  fcoe: use CHECKSUM_UNNECESSARY instead of CHECKSUM_PARTIAL on tx\n  net: do not do gso for CHECKSUM_UNNECESSARY in netif_needs_gso\n  ixgbe: Fix issues with SR-IOV loopback when flow control is disabled\n  net/hyperv: Fix the code handling tx busy\n  ixgbe: fix namespace issues when FCoE/DCB is not enabled\n  rtlwifi: Remove unused ETH_ADDR_LEN defines\n  igbvf: Use ETH_ALEN\n  ...\n\nFix up fairly trivial conflicts in drivers/isdn/gigaset/interface.c and\ndrivers/net/usb/{Kconfig,qmi_wwan.c} as per David.\n"
    },
    {
      "commit": "843ec558f91b8e8fdb6efc908f2c0506407cc750",
      "tree": "1866dccbc298390fc8686875942324075fd83f9d",
      "parents": [
        "71e7ff2578c3bc67fd893a9ba7f69fd563f271de",
        "fb8ebec00b04f921ea1614a7303f1a8e5e9e47c5"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Mar 20 11:24:39 2012 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Mar 20 11:24:39 2012 -0700"
      },
      "message": "Merge tag \u0027tty-3.3\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty\n\nPull TTY/serial patches from Greg KH:\n \"tty and serial merge for 3.4-rc1\n\n  Here\u0027s the big serial and tty merge for the 3.4-rc1 tree.\n\n  There\u0027s loads of fixes and reworks in here from Jiri for the tty\n  layer, and a number of patches from Alan to help try to wrestle the vt\n  layer into a sane model.\n\n  Other than that, lots of driver updates and fixes, and other minor\n  stuff, all detailed in the shortlog.\"\n\n* tag \u0027tty-3.3\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty: (132 commits)\n  serial: pxa: add clk_prepare/clk_unprepare calls\n  TTY: Wrong unicode value copied in con_set_unimap()\n  serial: PL011: clear pending interrupts\n  serial: bfin-uart: Don\u0027t access tty circular buffer in TX DMA interrupt after it is reset.\n  vt: NULL dereference in vt_do_kdsk_ioctl()\n  tty: serial: vt8500: fix annotations for probe/remove\n  serial: remove back and forth conversions in serial_out_sync\n  serial: use serial_port_in/out vs serial_in/out in 8250\n  serial: introduce generic port in/out helpers\n  serial: reduce number of indirections in 8250 code\n  serial: delete useless void casts in 8250.c\n  serial: make 8250\u0027s serial_in shareable to other drivers.\n  serial: delete last unused traces of pausing I/O in 8250\n  pch_uart: Add module parameter descriptions\n  pch_uart: Use existing default_baud in setup_console\n  pch_uart: Add user_uartclk parameter\n  pch_uart: Add Fish River Island II uart clock quirks\n  pch_uart: Use uartclk instead of base_baud\n  mpc5200b/uart: select more tolerant uart prescaler on low baudrates\n  tty: moxa: fix bit test in moxa_start()\n  ...\n"
    },
    {
      "commit": "2f16669d322e05171c9e1cfd94f402f7399bd2a3",
      "tree": "6a036cd0352928dd7056976a5f457c229322d67f",
      "parents": [
        "87cab16beb882d3f9e61a2c0184fa7cf76de1f90"
      ],
      "author": {
        "name": "Jiri Slaby",
        "email": "jslaby@suse.cz",
        "time": "Mon Mar 05 14:51:52 2012 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@linuxfoundation.org",
        "time": "Thu Mar 08 11:37:58 2012 -0800"
      },
      "message": "TTY: remove re-assignments to tty_driver members\n\nAll num, magic and owner are set by alloc_tty_driver. No need to\nre-set them on each allocation site.\n\npti driver sets something different to what it passes to\nalloc_tty_driver. It is not a bug, since we don\u0027t use the lines\nparameter in any way. Anyway this is fixed, and now we do the right\nthing.\n\nSigned-off-by: Jiri Slaby \u003cjslaby@suse.cz\u003e\nAcked-by: Tilman Schmidt \u003ctilman@imap.cc\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n"
    },
    {
      "commit": "e57d758ae8e8f00e80f233c823aeeef34bd92796",
      "tree": "0e97a6233731b3865039cad385fdd077dc3bc89a",
      "parents": [
        "9498ba7a1d38d42eef4ef6d906ab1743c9f0fd6f"
      ],
      "author": {
        "name": "Luiz Augusto von Dentz",
        "email": "luiz.von.dentz@intel.com",
        "time": "Wed Mar 07 20:20:14 2012 +0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Mar 08 02:20:22 2012 -0300"
      },
      "message": "Bluetooth: Fix using uninitialized variable\n\n+ src/net/bluetooth/rfcomm/tty.c: warning: \u0027p\u0027 is used uninitialized in this\n       function:  \u003d\u003e 218\n+ src/net/bluetooth/rfcomm/tty.c: warning: \u0027p\u0027 may be used uninitialized in\n       this function:  \u003d\u003e 218\n\nSigned-off-by: Luiz Augusto von Dentz \u003cluiz.von.dentz@intel.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "cf33e77b76d7439f21a23a94eab4ab3b405a6a7d",
      "tree": "3e8ad4b4c7a2cb23835c3c2144457a56eba7129b",
      "parents": [
        "a51cd2be864a3cc0272359b1995e213341dfc7e7"
      ],
      "author": {
        "name": "Octavian Purdila",
        "email": "octavian.purdila@intel.com",
        "time": "Fri Jan 27 19:32:39 2012 +0200"
      },
      "committer": {
        "name": "Johan Hedberg",
        "email": "johan.hedberg@intel.com",
        "time": "Wed Feb 15 13:09:26 2012 +0200"
      },
      "message": "Bluetooth: Fix RFCOMM session reference counting issue\n\nThere is an imbalance in the rfcomm_session_hold / rfcomm_session_put\noperations which causes the following crash:\n\n[  685.010159] BUG: unable to handle kernel paging request at 6b6b6b6b\n[  685.010169] IP: [\u003cc149d76d\u003e] rfcomm_process_dlcs+0x1b/0x15e\n[  685.010181] *pdpt \u003d 000000002d665001 *pde \u003d 0000000000000000\n[  685.010191] Oops: 0000 [#1] PREEMPT SMP\n[  685.010247]\n[  685.010255] Pid: 947, comm: krfcommd Tainted: G         C  3.0.16-mid8-dirty #44\n[  685.010266] EIP: 0060:[\u003cc149d76d\u003e] EFLAGS: 00010246 CPU: 1\n[  685.010274] EIP is at rfcomm_process_dlcs+0x1b/0x15e\n[  685.010281] EAX: e79f551c EBX: 6b6b6b6b ECX: 00000007 EDX: e79f40b4\n[  685.010288] ESI: e79f4060 EDI: ed4e1f70 EBP: ed4e1f68 ESP: ed4e1f50\n[  685.010295]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068\n[  685.010303] Process krfcommd (pid: 947, ti\u003ded4e0000 task\u003ded43e5e0 task.ti\u003ded4e0000)\n[  685.010308] Stack:\n[  685.010312]  ed4e1f68 c149eb53 e5925150 e79f4060 ed500000 ed4e1f70 ed4e1f80 c149ec10\n[  685.010331]  00000000 ed43e5e0 00000000 ed4e1f90 ed4e1f9c c149ec87 0000bf54 00000000\n[  685.010348]  00000000 ee03bf54 c149ec37 ed4e1fe4 c104fe01 00000000 00000000 00000000\n[  685.010367] Call Trace:\n[  685.010376]  [\u003cc149eb53\u003e] ? rfcomm_process_rx+0x6e/0x74\n[  685.010387]  [\u003cc149ec10\u003e] rfcomm_process_sessions+0xb7/0xde\n[  685.010398]  [\u003cc149ec87\u003e] rfcomm_run+0x50/0x6d\n[  685.010409]  [\u003cc149ec37\u003e] ? rfcomm_process_sessions+0xde/0xde\n[  685.010419]  [\u003cc104fe01\u003e] kthread+0x63/0x68\n[  685.010431]  [\u003cc104fd9e\u003e] ? __init_kthread_worker+0x42/0x42\n[  685.010442]  [\u003cc14dae82\u003e] kernel_thread_helper+0x6/0xd\n\nThis issue has been brought up earlier here:\n\nhttps://lkml.org/lkml/2011/5/21/127\n\nThe issue appears to be the rfcomm_session_put in rfcomm_recv_ua. This\noperation doesn\u0027t seem be to required as for the non-initiator case we\nhave the rfcomm_process_rx doing an explicit put and in the initiator\ncase the last dlc_unlink will drive the reference counter to 0.\n\nThere have been several attempts to fix these issue:\n\n6c2718d Bluetooth: Do not call rfcomm_session_put() for RFCOMM UA on closed socket\n683d949 Bluetooth: Never deallocate a session when some DLC points to it\n\nbut AFAICS they do not fix the issue just make it harder to reproduce.\n\nSigned-off-by: Octavian Purdila \u003coctavian.purdila@intel.com\u003e\nSigned-off-by: Gopala Krishna Murala \u003cgopala.krishna.murala@intel.com\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Johan Hedberg \u003cjohan.hedberg@intel.com\u003e\n"
    },
    {
      "commit": "b5a30dda6598af216c070165ece6068f9f00f33a",
      "tree": "049eff0341a243dbd02af3c83a7166f941177833",
      "parents": [
        "331660637b4e5136602a98200a84f6b65ed8d5be"
      ],
      "author": {
        "name": "Octavian Purdila",
        "email": "tavi.purdila@gmail.com",
        "time": "Sun Jan 22 00:28:34 2012 +0200"
      },
      "committer": {
        "name": "Johan Hedberg",
        "email": "johan.hedberg@intel.com",
        "time": "Wed Feb 15 13:09:26 2012 +0200"
      },
      "message": "Bluetooth: silence lockdep warning\n\nSince bluetooth uses multiple protocols types, to avoid lockdep\nwarnings, we need to use different lockdep classes (one for each\nprotocol type).\n\nThis is already done in bt_sock_create but it misses a couple of cases\nwhen new connections are created. This patch corrects that to fix the\nfollowing warning:\n\n\u003c4\u003e[ 1864.732366] \u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n\u003c4\u003e[ 1864.733030] [ INFO: possible circular locking dependency detected ]\n\u003c4\u003e[ 1864.733544] 3.0.16-mid3-00007-gc9a0f62 #3\n\u003c4\u003e[ 1864.733883] -------------------------------------------------------\n\u003c4\u003e[ 1864.734408] t.android.btclc/4204 is trying to acquire lock:\n\u003c4\u003e[ 1864.734869]  (rfcomm_mutex){+.+.+.}, at: [\u003cc14970ea\u003e] rfcomm_dlc_close+0x15/0x30\n\u003c4\u003e[ 1864.735541]\n\u003c4\u003e[ 1864.735549] but task is already holding lock:\n\u003c4\u003e[ 1864.736045]  (sk_lock-AF_BLUETOOTH){+.+.+.}, at: [\u003cc1498bf7\u003e] lock_sock+0xa/0xc\n\u003c4\u003e[ 1864.736732]\n\u003c4\u003e[ 1864.736740] which lock already depends on the new lock.\n\u003c4\u003e[ 1864.736750]\n\u003c4\u003e[ 1864.737428]\n\u003c4\u003e[ 1864.737437] the existing dependency chain (in reverse order) is:\n\u003c4\u003e[ 1864.738016]\n\u003c4\u003e[ 1864.738023] -\u003e #1 (sk_lock-AF_BLUETOOTH){+.+.+.}:\n\u003c4\u003e[ 1864.738549]        [\u003cc1062273\u003e] lock_acquire+0x104/0x140\n\u003c4\u003e[ 1864.738977]        [\u003cc13d35c1\u003e] lock_sock_nested+0x58/0x68\n\u003c4\u003e[ 1864.739411]        [\u003cc1493c33\u003e] l2cap_sock_sendmsg+0x3e/0x76\n\u003c4\u003e[ 1864.739858]        [\u003cc13d06c3\u003e] __sock_sendmsg+0x50/0x59\n\u003c4\u003e[ 1864.740279]        [\u003cc13d0ea2\u003e] sock_sendmsg+0x94/0xa8\n\u003c4\u003e[ 1864.740687]        [\u003cc13d0ede\u003e] kernel_sendmsg+0x28/0x37\n\u003c4\u003e[ 1864.741106]        [\u003cc14969ca\u003e] rfcomm_send_frame+0x30/0x38\n\u003c4\u003e[ 1864.741542]        [\u003cc1496a2a\u003e] rfcomm_send_ua+0x58/0x5a\n\u003c4\u003e[ 1864.741959]        [\u003cc1498447\u003e] rfcomm_run+0x441/0xb52\n\u003c4\u003e[ 1864.742365]        [\u003cc104f095\u003e] kthread+0x63/0x68\n\u003c4\u003e[ 1864.742742]        [\u003cc14d5182\u003e] kernel_thread_helper+0x6/0xd\n\u003c4\u003e[ 1864.743187]\n\u003c4\u003e[ 1864.743193] -\u003e #0 (rfcomm_mutex){+.+.+.}:\n\u003c4\u003e[ 1864.743667]        [\u003cc1061ada\u003e] __lock_acquire+0x988/0xc00\n\u003c4\u003e[ 1864.744100]        [\u003cc1062273\u003e] lock_acquire+0x104/0x140\n\u003c4\u003e[ 1864.744519]        [\u003cc14d2c70\u003e] __mutex_lock_common+0x3b/0x33f\n\u003c4\u003e[ 1864.744975]        [\u003cc14d303e\u003e] mutex_lock_nested+0x2d/0x36\n\u003c4\u003e[ 1864.745412]        [\u003cc14970ea\u003e] rfcomm_dlc_close+0x15/0x30\n\u003c4\u003e[ 1864.745842]        [\u003cc14990d9\u003e] __rfcomm_sock_close+0x5f/0x6b\n\u003c4\u003e[ 1864.746288]        [\u003cc1499114\u003e] rfcomm_sock_shutdown+0x2f/0x62\n\u003c4\u003e[ 1864.746737]        [\u003cc13d275d\u003e] sys_socketcall+0x1db/0x422\n\u003c4\u003e[ 1864.747165]        [\u003cc14d42f0\u003e] syscall_call+0x7/0xb\n\nSigned-off-by: Octavian Purdila \u003coctavian.purdila@intel.com\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Johan Hedberg \u003cjohan.hedberg@intel.com\u003e\n"
    },
    {
      "commit": "66f01296962dfebf032c18ffe61c53a199b4a7bd",
      "tree": "f352f1e197cb0c8c7a9b959c0e1061df08433f38",
      "parents": [
        "4777bfdebbddc1f58d9148de5a3e00375d063768"
      ],
      "author": {
        "name": "Octavian Purdila",
        "email": "octavian.purdila@intel.com",
        "time": "Fri Jan 27 19:32:39 2012 +0200"
      },
      "committer": {
        "name": "Johan Hedberg",
        "email": "johan.hedberg@intel.com",
        "time": "Mon Feb 13 17:01:31 2012 +0200"
      },
      "message": "Bluetooth: Fix RFCOMM session reference counting issue\n\nThere is an imbalance in the rfcomm_session_hold / rfcomm_session_put\noperations which causes the following crash:\n\n[  685.010159] BUG: unable to handle kernel paging request at 6b6b6b6b\n[  685.010169] IP: [\u003cc149d76d\u003e] rfcomm_process_dlcs+0x1b/0x15e\n[  685.010181] *pdpt \u003d 000000002d665001 *pde \u003d 0000000000000000\n[  685.010191] Oops: 0000 [#1] PREEMPT SMP\n[  685.010247]\n[  685.010255] Pid: 947, comm: krfcommd Tainted: G         C  3.0.16-mid8-dirty #44\n[  685.010266] EIP: 0060:[\u003cc149d76d\u003e] EFLAGS: 00010246 CPU: 1\n[  685.010274] EIP is at rfcomm_process_dlcs+0x1b/0x15e\n[  685.010281] EAX: e79f551c EBX: 6b6b6b6b ECX: 00000007 EDX: e79f40b4\n[  685.010288] ESI: e79f4060 EDI: ed4e1f70 EBP: ed4e1f68 ESP: ed4e1f50\n[  685.010295]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068\n[  685.010303] Process krfcommd (pid: 947, ti\u003ded4e0000 task\u003ded43e5e0 task.ti\u003ded4e0000)\n[  685.010308] Stack:\n[  685.010312]  ed4e1f68 c149eb53 e5925150 e79f4060 ed500000 ed4e1f70 ed4e1f80 c149ec10\n[  685.010331]  00000000 ed43e5e0 00000000 ed4e1f90 ed4e1f9c c149ec87 0000bf54 00000000\n[  685.010348]  00000000 ee03bf54 c149ec37 ed4e1fe4 c104fe01 00000000 00000000 00000000\n[  685.010367] Call Trace:\n[  685.010376]  [\u003cc149eb53\u003e] ? rfcomm_process_rx+0x6e/0x74\n[  685.010387]  [\u003cc149ec10\u003e] rfcomm_process_sessions+0xb7/0xde\n[  685.010398]  [\u003cc149ec87\u003e] rfcomm_run+0x50/0x6d\n[  685.010409]  [\u003cc149ec37\u003e] ? rfcomm_process_sessions+0xde/0xde\n[  685.010419]  [\u003cc104fe01\u003e] kthread+0x63/0x68\n[  685.010431]  [\u003cc104fd9e\u003e] ? __init_kthread_worker+0x42/0x42\n[  685.010442]  [\u003cc14dae82\u003e] kernel_thread_helper+0x6/0xd\n\nThis issue has been brought up earlier here:\n\nhttps://lkml.org/lkml/2011/5/21/127\n\nThe issue appears to be the rfcomm_session_put in rfcomm_recv_ua. This\noperation doesn\u0027t seem be to required as for the non-initiator case we\nhave the rfcomm_process_rx doing an explicit put and in the initiator\ncase the last dlc_unlink will drive the reference counter to 0.\n\nThere have been several attempts to fix these issue:\n\n6c2718d Bluetooth: Do not call rfcomm_session_put() for RFCOMM UA on closed socket\n683d949 Bluetooth: Never deallocate a session when some DLC points to it\n\nbut AFAICS they do not fix the issue just make it harder to reproduce.\n\nSigned-off-by: Octavian Purdila \u003coctavian.purdila@intel.com\u003e\nSigned-off-by: Gopala Krishna Murala \u003cgopala.krishna.murala@intel.com\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Johan Hedberg \u003cjohan.hedberg@intel.com\u003e\n"
    },
    {
      "commit": "d22015aad40b4316f0f74c8e410debca44c3e6e2",
      "tree": "bf307bc24f08419c9e711594f4984f96057a161b",
      "parents": [
        "61e1b4b7de5c7e3b671e069f8bf7ee94dedbfde0"
      ],
      "author": {
        "name": "Octavian Purdila",
        "email": "tavi.purdila@gmail.com",
        "time": "Sun Jan 22 00:28:34 2012 +0200"
      },
      "committer": {
        "name": "Johan Hedberg",
        "email": "johan.hedberg@intel.com",
        "time": "Mon Feb 13 17:01:29 2012 +0200"
      },
      "message": "Bluetooth: silence lockdep warning\n\nSince bluetooth uses multiple protocols types, to avoid lockdep\nwarnings, we need to use different lockdep classes (one for each\nprotocol type).\n\nThis is already done in bt_sock_create but it misses a couple of cases\nwhen new connections are created. This patch corrects that to fix the\nfollowing warning:\n\n\u003c4\u003e[ 1864.732366] \u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n\u003c4\u003e[ 1864.733030] [ INFO: possible circular locking dependency detected ]\n\u003c4\u003e[ 1864.733544] 3.0.16-mid3-00007-gc9a0f62 #3\n\u003c4\u003e[ 1864.733883] -------------------------------------------------------\n\u003c4\u003e[ 1864.734408] t.android.btclc/4204 is trying to acquire lock:\n\u003c4\u003e[ 1864.734869]  (rfcomm_mutex){+.+.+.}, at: [\u003cc14970ea\u003e] rfcomm_dlc_close+0x15/0x30\n\u003c4\u003e[ 1864.735541]\n\u003c4\u003e[ 1864.735549] but task is already holding lock:\n\u003c4\u003e[ 1864.736045]  (sk_lock-AF_BLUETOOTH){+.+.+.}, at: [\u003cc1498bf7\u003e] lock_sock+0xa/0xc\n\u003c4\u003e[ 1864.736732]\n\u003c4\u003e[ 1864.736740] which lock already depends on the new lock.\n\u003c4\u003e[ 1864.736750]\n\u003c4\u003e[ 1864.737428]\n\u003c4\u003e[ 1864.737437] the existing dependency chain (in reverse order) is:\n\u003c4\u003e[ 1864.738016]\n\u003c4\u003e[ 1864.738023] -\u003e #1 (sk_lock-AF_BLUETOOTH){+.+.+.}:\n\u003c4\u003e[ 1864.738549]        [\u003cc1062273\u003e] lock_acquire+0x104/0x140\n\u003c4\u003e[ 1864.738977]        [\u003cc13d35c1\u003e] lock_sock_nested+0x58/0x68\n\u003c4\u003e[ 1864.739411]        [\u003cc1493c33\u003e] l2cap_sock_sendmsg+0x3e/0x76\n\u003c4\u003e[ 1864.739858]        [\u003cc13d06c3\u003e] __sock_sendmsg+0x50/0x59\n\u003c4\u003e[ 1864.740279]        [\u003cc13d0ea2\u003e] sock_sendmsg+0x94/0xa8\n\u003c4\u003e[ 1864.740687]        [\u003cc13d0ede\u003e] kernel_sendmsg+0x28/0x37\n\u003c4\u003e[ 1864.741106]        [\u003cc14969ca\u003e] rfcomm_send_frame+0x30/0x38\n\u003c4\u003e[ 1864.741542]        [\u003cc1496a2a\u003e] rfcomm_send_ua+0x58/0x5a\n\u003c4\u003e[ 1864.741959]        [\u003cc1498447\u003e] rfcomm_run+0x441/0xb52\n\u003c4\u003e[ 1864.742365]        [\u003cc104f095\u003e] kthread+0x63/0x68\n\u003c4\u003e[ 1864.742742]        [\u003cc14d5182\u003e] kernel_thread_helper+0x6/0xd\n\u003c4\u003e[ 1864.743187]\n\u003c4\u003e[ 1864.743193] -\u003e #0 (rfcomm_mutex){+.+.+.}:\n\u003c4\u003e[ 1864.743667]        [\u003cc1061ada\u003e] __lock_acquire+0x988/0xc00\n\u003c4\u003e[ 1864.744100]        [\u003cc1062273\u003e] lock_acquire+0x104/0x140\n\u003c4\u003e[ 1864.744519]        [\u003cc14d2c70\u003e] __mutex_lock_common+0x3b/0x33f\n\u003c4\u003e[ 1864.744975]        [\u003cc14d303e\u003e] mutex_lock_nested+0x2d/0x36\n\u003c4\u003e[ 1864.745412]        [\u003cc14970ea\u003e] rfcomm_dlc_close+0x15/0x30\n\u003c4\u003e[ 1864.745842]        [\u003cc14990d9\u003e] __rfcomm_sock_close+0x5f/0x6b\n\u003c4\u003e[ 1864.746288]        [\u003cc1499114\u003e] rfcomm_sock_shutdown+0x2f/0x62\n\u003c4\u003e[ 1864.746737]        [\u003cc13d275d\u003e] sys_socketcall+0x1db/0x422\n\u003c4\u003e[ 1864.747165]        [\u003cc14d42f0\u003e] syscall_call+0x7/0xb\n\nSigned-off-by: Octavian Purdila \u003coctavian.purdila@intel.com\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Johan Hedberg \u003cjohan.hedberg@intel.com\u003e\n"
    },
    {
      "commit": "874c60bad92564358e87d58f505fceb0b09ec1aa",
      "tree": "f6a5cadf50e07971f711b6cdf627797c5e1c095b",
      "parents": [
        "a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27",
        "c5993de864d96b3656e9fca38c377b130105d97a"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jan 10 15:44:17 2012 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jan 10 15:44:17 2012 -0500"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/padovan/bluetooth-next\n"
    },
    {
      "commit": "57adc1fcbae2c13104ce291b40f23e40a414fa87",
      "tree": "a22d95cd3a96cbd515cd24fb0833739576c5e92f",
      "parents": [
        "faa85aa24286a9e14ae7cc797352350c3ac39986",
        "dc0d633e35643662f27a0b1c531da3cd6b204b9c"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jan 03 15:16:34 2012 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Jan 03 15:16:34 2012 -0500"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-next into for-davem\n\nConflicts:\n\tdrivers/net/wireless/b43/dma.c\n\tdrivers/net/wireless/brcm80211/brcmfmac/dhd_linux.c\n"
    },
    {
      "commit": "393432cd8dc02b88a00decd495913643aa5ff705",
      "tree": "2c59666496a3c669781bbc8bb5f94854a1b6f944",
      "parents": [
        "95ca83f42fb5f5bf789b514635f79242afe555d1"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Tue Dec 27 15:28:45 2011 -0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Jan 02 22:19:29 2012 -0200"
      },
      "message": "Bluetooth: Fix context in RFCOMM tty\n\nWe now run in process context, no need to disable interrupts.\nCalls from the tty layer also run in process context.\n\nrw_lock was converted to spinlock, we have more writers than readers in\nthis case.\n\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "95ca83f42fb5f5bf789b514635f79242afe555d1",
      "tree": "5cb07ebaf9113fcb8b86378362ad66184c84d7e8",
      "parents": [
        "9219b2a08c8a1ca9935b85ec4ab119bb55b0cb15"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Tue Dec 27 15:28:44 2011 -0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Jan 02 22:17:29 2012 -0200"
      },
      "message": "Bluetooth: Fix context in rfcomm_sock_lock\n\nCode now run in process context, does not need to disable interrupt\nanymore.\n\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "4ae1652ef1bf38e07caa5d1d86ffd3b31103b55a",
      "tree": "c75275f7080589390fd7b80556e518cb49ec7c73",
      "parents": [
        "3573b80c42e88c2a43c068c86bcd1a753cf6e1a0"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Tue Dec 27 14:43:41 2011 -0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Tue Dec 27 14:43:41 2011 -0200"
      },
      "message": "Bluetooth: Fix a compile warning in RFCOMM\n\nsock and sk were leftover from another change.\n\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "abb434cb0539fb355c1c921f8fd761efbbac3462",
      "tree": "24a7d99ec161f8fd4dc9ff03c9c4cc93be883ce6",
      "parents": [
        "2494654d4890316e7340fb8b3458daad0474a1b9",
        "6350323ad8def2ac00d77cdee3b79c9b9fba75c4"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Dec 23 17:13:56 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Dec 23 17:13:56 2011 -0500"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net\n\nConflicts:\n\tnet/bluetooth/l2cap_core.c\n\nJust two overlapping changes, one added an initialization of\na local variable, and another change added a new local variable.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5436538fb5f2a12e5328dcaa2e3a1742be25c2e0",
      "tree": "ebf9a7c7d5f0e626de55e0679350a4b1200945c5",
      "parents": [
        "c0190925dacd976a67044f4382d4effbed568dce"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Tue Dec 20 16:30:44 2011 -0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Dec 22 14:45:10 2011 -0200"
      },
      "message": "Bluetooth: Remove l2cap priority from inside RFCOMM.\n\nRFCOMM needs a proper priority mechanism inside itself and not try to use\nl2cap priority to fix its own problem.\n\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "f1e91e1640d808d332498a6b09b2bcd01462eff9",
      "tree": "0532037e97621e971bd1301d4bfd5b02e992c60e",
      "parents": [
        "f2d64f6aa6c681ca00a71c2b3304ed80dc317752"
      ],
      "author": {
        "name": "Ulisses Furquim",
        "email": "ulisses@profusion.mobi",
        "time": "Wed Dec 21 01:32:09 2011 -0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Wed Dec 21 02:21:08 2011 -0200"
      },
      "message": "Bluetooth: Always compile SCO and L2CAP in Bluetooth Core\n\nThe handling of SCO audio links and the L2CAP protocol are essential to\nany system with Bluetooth thus are always compiled in from now on.\n\nSigned-off-by: Ulisses Furquim \u003culisses@profusion.mobi\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "eb93992207dadb946a3b5cf4544957dc924a6f58",
      "tree": "8d840ea0e0e5eb3cf6207a2608d434475a9076b4",
      "parents": [
        "3db1cd5c05f35fb43eb134df6f321de4e63141f2"
      ],
      "author": {
        "name": "Rusty Russell",
        "email": "rusty@rustcorp.com.au",
        "time": "Mon Dec 19 14:08:01 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Dec 19 22:27:29 2011 -0500"
      },
      "message": "module_param: make bool parameters really bool (net \u0026 drivers/net)\n\nmodule_param(bool) used to counter-intuitively take an int.  In\nfddd5201 (mid-2009) we allowed bool or int/unsigned int using a messy\ntrick.\n\nIt\u0027s time to remove the int/unsigned int option.  For this version\nit\u0027ll simply give a warning, but it\u0027ll break next kernel version.\n\n(Thanks to Joe Perches for suggesting coccinelle for 0/1 -\u003e true/false).\n\nCc: \"David S. Miller\" \u003cdavem@davemloft.net\u003e\nCc: netdev@vger.kernel.org\nSigned-off-by: Rusty Russell \u003crusty@rustcorp.com.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4b0b2f088f12e2ada1297502d7bebde182cf65b0",
      "tree": "c3f5bdb06a047eaca8a2e09b6dfd285d0cc26037",
      "parents": [
        "4dad99928211a20a91ec4515ab3b53fd65988f34",
        "d7660918fce210f421cc58c060ca3de71e4ffd37"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Dec 19 11:37:53 2011 -0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Dec 19 11:37:53 2011 -0200"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/padovan/bluetooth\n\nConflicts:\n\tnet/bluetooth/l2cap_core.c\n"
    },
    {
      "commit": "79e654787c67f6b05f73366ff8ccac72ba7249e6",
      "tree": "c1a498c2af15b6df2387898ac260c84f4a4dbbd1",
      "parents": [
        "36e999a83a4a4badd389901eb6d23a30e199b8db"
      ],
      "author": {
        "name": "Mat Martineau",
        "email": "mathewm@codeaurora.org",
        "time": "Tue Dec 06 16:23:26 2011 -0800"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Sun Dec 18 22:29:35 2011 -0200"
      },
      "message": "Bluetooth: Clear RFCOMM session timer when disconnecting last channel\n\nWhen the last RFCOMM data channel is closed, a timer is normally set\nup to disconnect the control channel at a later time.  If the control\nchannel disconnect command is sent with the timer pending, the timer\nneeds to be cancelled.\n\nIf the timer is not cancelled in this situation, the reference\ncounting logic for the RFCOMM session does not work correctly when the\nremote device closes the L2CAP connection.  The session is freed at\nthe wrong time, leading to a kernel panic.\n\nSigned-off-by: Mat Martineau \u003cmathewm@codeaurora.org\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "312fef7d18adda2be822d31916547f84ed6af28b",
      "tree": "095d936b751b0a92946fcf710fb74dea7f8f33f7",
      "parents": [
        "5e819059a20b0fc5a71875f28b4cae359e38d85a",
        "2aeabcbedd51aef94b61d05b57246d1db4984453"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Nov 09 14:54:33 2011 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Nov 09 14:54:33 2011 -0500"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/padovan/bluetooth-next\n\nConflicts:\n\tnet/bluetooth/l2cap_sock.c\n\tnet/bluetooth/mgmt.c\n"
    },
    {
      "commit": "db54467a89266c02f9ce6c6db1d193365cff62a4",
      "tree": "0345f034fd3cfd910ec41b17619766e394018ccb",
      "parents": [
        "164a6e78990f6201dc3105ff88335ca91392a427"
      ],
      "author": {
        "name": "Szymon Janc",
        "email": "szymon.janc@tieto.com",
        "time": "Mon Sep 26 14:19:47 2011 +0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Nov 07 17:24:49 2011 -0200"
      },
      "message": "Bluetooth: rfcomm: Fix sleep in invalid context in rfcomm_security_cfm\n\nThis was triggered by turning off encryption on ACL link when rfcomm\nwas using high security. rfcomm_security_cfm (which is called from rx\ntask) was closing DLC and this involves sending disconnect message\n(and locking socket).\n\nMove closing DLC to rfcomm_process_dlcs and only flag DLC for closure\nin rfcomm_security_cfm.\n\nBUG: sleeping function called from invalid context at net/core/sock.c:2032\nin_atomic(): 1, irqs_disabled(): 0, pid: 1788, name: kworker/0:3\n[\u003cc0068a08\u003e] (unwind_backtrace+0x0/0x108) from [\u003cc05e25dc\u003e] (dump_stack+0x20/0x24)\n[\u003cc05e25dc\u003e] (dump_stack+0x20/0x24) from [\u003cc0087ba8\u003e] (__might_sleep+0x110/0x12c)\n[\u003cc0087ba8\u003e] (__might_sleep+0x110/0x12c) from [\u003cc04801d8\u003e] (lock_sock_nested+0x2c/0x64)\n[\u003cc04801d8\u003e] (lock_sock_nested+0x2c/0x64) from [\u003cc05670c8\u003e] (l2cap_sock_sendmsg+0x58/0xcc)\n[\u003cc05670c8\u003e] (l2cap_sock_sendmsg+0x58/0xcc) from [\u003cc047cf6c\u003e] (sock_sendmsg+0xb0/0xd0)\n[\u003cc047cf6c\u003e] (sock_sendmsg+0xb0/0xd0) from [\u003cc047cfc8\u003e] (kernel_sendmsg+0x3c/0x44)\n[\u003cc047cfc8\u003e] (kernel_sendmsg+0x3c/0x44) from [\u003cc056b0e8\u003e] (rfcomm_send_frame+0x50/0x58)\n[\u003cc056b0e8\u003e] (rfcomm_send_frame+0x50/0x58) from [\u003cc056b168\u003e] (rfcomm_send_disc+0x78/0x80)\n[\u003cc056b168\u003e] (rfcomm_send_disc+0x78/0x80) from [\u003cc056b9f4\u003e] (__rfcomm_dlc_close+0x2d0/0x2fc)\n[\u003cc056b9f4\u003e] (__rfcomm_dlc_close+0x2d0/0x2fc) from [\u003cc056bbac\u003e] (rfcomm_security_cfm+0x140/0x1e0)\n[\u003cc056bbac\u003e] (rfcomm_security_cfm+0x140/0x1e0) from [\u003cc0555ec0\u003e] (hci_event_packet+0x1ce8/0x4d84)\n[\u003cc0555ec0\u003e] (hci_event_packet+0x1ce8/0x4d84) from [\u003cc0550380\u003e] (hci_rx_task+0x1d0/0x2d0)\n[\u003cc0550380\u003e] (hci_rx_task+0x1d0/0x2d0) from [\u003cc009ee04\u003e] (tasklet_action+0x138/0x1e4)\n[\u003cc009ee04\u003e] (tasklet_action+0x138/0x1e4) from [\u003cc009f21c\u003e] (__do_softirq+0xcc/0x274)\n[\u003cc009f21c\u003e] (__do_softirq+0xcc/0x274) from [\u003cc009f6c0\u003e] (do_softirq+0x60/0x6c)\n[\u003cc009f6c0\u003e] (do_softirq+0x60/0x6c) from [\u003cc009f794\u003e] (local_bh_enable_ip+0xc8/0xd4)\n[\u003cc009f794\u003e] (local_bh_enable_ip+0xc8/0xd4) from [\u003cc05e5804\u003e] (_raw_spin_unlock_bh+0x48/0x4c)\n[\u003cc05e5804\u003e] (_raw_spin_unlock_bh+0x48/0x4c) from [\u003cc040d470\u003e] (data_from_chip+0xf4/0xaec)\n[\u003cc040d470\u003e] (data_from_chip+0xf4/0xaec) from [\u003cc04136c0\u003e] (send_skb_to_core+0x40/0x178)\n[\u003cc04136c0\u003e] (send_skb_to_core+0x40/0x178) from [\u003cc04139f4\u003e] (cg2900_hu_receive+0x15c/0x2d0)\n[\u003cc04139f4\u003e] (cg2900_hu_receive+0x15c/0x2d0) from [\u003cc0414cb8\u003e] (hci_uart_tty_receive+0x74/0xa0)\n[\u003cc0414cb8\u003e] (hci_uart_tty_receive+0x74/0xa0) from [\u003cc02cbd9c\u003e] (flush_to_ldisc+0x188/0x198)\n[\u003cc02cbd9c\u003e] (flush_to_ldisc+0x188/0x198) from [\u003cc00b2774\u003e] (process_one_work+0x144/0x4b8)\n[\u003cc00b2774\u003e] (process_one_work+0x144/0x4b8) from [\u003cc00b2e8c\u003e] (worker_thread+0x198/0x468)\n[\u003cc00b2e8c\u003e] (worker_thread+0x198/0x468) from [\u003cc00b9bc8\u003e] (kthread+0x98/0xa0)\n[\u003cc00b9bc8\u003e] (kthread+0x98/0xa0) from [\u003cc0061744\u003e] (kernel_thread_exit+0x0/0x8)\n\nSigned-off-by: Szymon Janc \u003cszymon.janc@tieto.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "262038fcb2a50e9b5553243452918fda08cdf83d",
      "tree": "c3e302fbc9141568efc8571cbd78deea66670720",
      "parents": [
        "5e59b791c3561e2fbb4aee17df3505ad25c16b7a"
      ],
      "author": {
        "name": "Luiz Augusto von Dentz",
        "email": "luiz.von.dentz@intel.com",
        "time": "Tue Nov 01 10:58:58 2011 +0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Nov 07 17:24:47 2011 -0200"
      },
      "message": "Bluetooth: make use sk_priority to priritize RFCOMM packets\n\nSigned-off-by: Luiz Augusto von Dentz \u003cluiz.von.dentz@intel.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "8035ded466049ca2fe8c04564a0fa00f222abe3f",
      "tree": "f589157028c85ebaa17be9f329405d1ccffa6304",
      "parents": [
        "457f48507deb0e8c8dd299c7d8dce7c2c0e291e8"
      ],
      "author": {
        "name": "Luiz Augusto von Dentz",
        "email": "luiz.von.dentz@intel.com",
        "time": "Tue Nov 01 10:58:56 2011 +0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Nov 07 17:24:46 2011 -0200"
      },
      "message": "Bluetooth: replace list_for_each with list_for_each_entry whenever possible\n\nWhen all items in the list have the same type there is no much of a point\nto use list_for_each except if you want to use the list pointer itself.\n\nSigned-off-by: Luiz Augusto von Dentz \u003cluiz.von.dentz@intel.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "96af7391b752cf3d2de3aef8f03c45ba76d3ac5e",
      "tree": "2aa2af0a3fb4980199056df76fdf4a8eeb108bf5",
      "parents": [
        "5ada9913630d48438f2e07551af43cbf297372d4"
      ],
      "author": {
        "name": "David Herrmann",
        "email": "dh.herrmann@googlemail.com",
        "time": "Mon Oct 24 15:30:58 2011 +0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Nov 07 17:24:40 2011 -0200"
      },
      "message": "Bluetooth: Replace rfcomm tty tasklet by workqueue\n\nRemove old tasklets and replace by workqueue. To avoid reentrancy (which\ntasklets always avoid) we use the system_nrt_wq.\n\nSigned-off-by: David Herrmann \u003cdh.herrmann@googlemail.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "5ada9913630d48438f2e07551af43cbf297372d4",
      "tree": "e8868bb9659794c935fa9d4bb85a0ea52a4b5e3b",
      "parents": [
        "42dceae2819b5ac6fc9a0d414ae05a8960e2a1d9"
      ],
      "author": {
        "name": "David Herrmann",
        "email": "dh.herrmann@googlemail.com",
        "time": "Mon Oct 24 15:30:57 2011 +0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Nov 07 17:24:39 2011 -0200"
      },
      "message": "Bluetooth: Return proper error codes on rfcomm tty init\n\nForward error codes from tty core to the rfcomm_init caller instead of using\ngeneric -1 errors.\n\nSigned-off-by: David Herrmann \u003cdh.herrmann@googlemail.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "c125d5e846894043361c0c89c1140be8fd6600b7",
      "tree": "8c613b696dc65b047ae6660e55abcd0c008be490",
      "parents": [
        "6a32e4f9dd9219261f8856f817e6655114cfec2f",
        "6b441fab28ea1cbbf3da75dcd1e7438e6cba704c"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Nov 02 15:15:51 2011 -0400"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Nov 02 15:15:51 2011 -0400"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/padovan/bluetooth\n"
    },
    {
      "commit": "1805b2f04855f07afe3a71d620a68f483b0ed74f",
      "tree": "b823b90f37f5404fcaef70f785c70112ca74a329",
      "parents": [
        "78d81d15b74246c7cedf84894434890b33da3907",
        "f42af6c486aa5ca6ee62800cb45c5b252020509d"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 24 18:18:09 2011 -0400"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 24 18:18:09 2011 -0400"
      },
      "message": "Merge branch \u0027master\u0027 of ra.kernel.org:/pub/scm/linux/kernel/git/davem/net\n"
    },
    {
      "commit": "6230c9b4f8957c8938ee4cf2d03166d3c2dc89de",
      "tree": "acb6aa03e5b34ab83c4945fdacefee66c5285af2",
      "parents": [
        "835acf5da239b91edb9f7ebe36516999e156e6ee"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "pmoore@redhat.com",
        "time": "Fri Oct 07 09:40:59 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Oct 18 23:36:43 2011 -0400"
      },
      "message": "bluetooth: Properly clone LSM attributes to newly created child connections\n\nThe Bluetooth stack has internal connection handlers for all of the various\nBluetooth protocols, and unfortunately, they are currently lacking the LSM\nhooks found in the core network stack\u0027s connection handlers.  I say\nunfortunately, because this can cause problems for users who have have an\nLSM enabled and are using certain Bluetooth devices.  See one problem\nreport below:\n\n * http://bugzilla.redhat.com/show_bug.cgi?id\u003d741703\n\nIn order to keep things simple at this point in time, this patch fixes the\nproblem by cloning the parent socket\u0027s LSM attributes to the newly created\nchild socket.  If we decide we need a more elaborate LSM marking mechanism\nfor Bluetooth (I somewhat doubt this) we can always revisit this decision\nin the future.\n\nReported-by: James M. Cape \u003cjcape@ignore-your.tv\u003e\nSigned-off-by: Paul Moore \u003cpmoore@redhat.com\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "88149db4948ef90cf6220d76e34955e46c2ff9f9",
      "tree": "ea4293d07db101b0f9ff3f1d1f50047ba5f429d9",
      "parents": [
        "8c23516fbb209ccf8f8c36268311c721faff29ee"
      ],
      "author": {
        "name": "Szymon Janc",
        "email": "szymon.janc@tieto.com",
        "time": "Mon Sep 26 14:19:47 2011 +0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Fri Oct 14 15:04:54 2011 -0300"
      },
      "message": "Bluetooth: rfcomm: Fix sleep in invalid context in rfcomm_security_cfm\n\nThis was triggered by turning off encryption on ACL link when rfcomm\nwas using high security. rfcomm_security_cfm (which is called from rx\ntask) was closing DLC and this involves sending disconnect message\n(and locking socket).\n\nMove closing DLC to rfcomm_process_dlcs and only flag DLC for closure\nin rfcomm_security_cfm.\n\nBUG: sleeping function called from invalid context at net/core/sock.c:2032\nin_atomic(): 1, irqs_disabled(): 0, pid: 1788, name: kworker/0:3\n[\u003cc0068a08\u003e] (unwind_backtrace+0x0/0x108) from [\u003cc05e25dc\u003e] (dump_stack+0x20/0x24)\n[\u003cc05e25dc\u003e] (dump_stack+0x20/0x24) from [\u003cc0087ba8\u003e] (__might_sleep+0x110/0x12c)\n[\u003cc0087ba8\u003e] (__might_sleep+0x110/0x12c) from [\u003cc04801d8\u003e] (lock_sock_nested+0x2c/0x64)\n[\u003cc04801d8\u003e] (lock_sock_nested+0x2c/0x64) from [\u003cc05670c8\u003e] (l2cap_sock_sendmsg+0x58/0xcc)\n[\u003cc05670c8\u003e] (l2cap_sock_sendmsg+0x58/0xcc) from [\u003cc047cf6c\u003e] (sock_sendmsg+0xb0/0xd0)\n[\u003cc047cf6c\u003e] (sock_sendmsg+0xb0/0xd0) from [\u003cc047cfc8\u003e] (kernel_sendmsg+0x3c/0x44)\n[\u003cc047cfc8\u003e] (kernel_sendmsg+0x3c/0x44) from [\u003cc056b0e8\u003e] (rfcomm_send_frame+0x50/0x58)\n[\u003cc056b0e8\u003e] (rfcomm_send_frame+0x50/0x58) from [\u003cc056b168\u003e] (rfcomm_send_disc+0x78/0x80)\n[\u003cc056b168\u003e] (rfcomm_send_disc+0x78/0x80) from [\u003cc056b9f4\u003e] (__rfcomm_dlc_close+0x2d0/0x2fc)\n[\u003cc056b9f4\u003e] (__rfcomm_dlc_close+0x2d0/0x2fc) from [\u003cc056bbac\u003e] (rfcomm_security_cfm+0x140/0x1e0)\n[\u003cc056bbac\u003e] (rfcomm_security_cfm+0x140/0x1e0) from [\u003cc0555ec0\u003e] (hci_event_packet+0x1ce8/0x4d84)\n[\u003cc0555ec0\u003e] (hci_event_packet+0x1ce8/0x4d84) from [\u003cc0550380\u003e] (hci_rx_task+0x1d0/0x2d0)\n[\u003cc0550380\u003e] (hci_rx_task+0x1d0/0x2d0) from [\u003cc009ee04\u003e] (tasklet_action+0x138/0x1e4)\n[\u003cc009ee04\u003e] (tasklet_action+0x138/0x1e4) from [\u003cc009f21c\u003e] (__do_softirq+0xcc/0x274)\n[\u003cc009f21c\u003e] (__do_softirq+0xcc/0x274) from [\u003cc009f6c0\u003e] (do_softirq+0x60/0x6c)\n[\u003cc009f6c0\u003e] (do_softirq+0x60/0x6c) from [\u003cc009f794\u003e] (local_bh_enable_ip+0xc8/0xd4)\n[\u003cc009f794\u003e] (local_bh_enable_ip+0xc8/0xd4) from [\u003cc05e5804\u003e] (_raw_spin_unlock_bh+0x48/0x4c)\n[\u003cc05e5804\u003e] (_raw_spin_unlock_bh+0x48/0x4c) from [\u003cc040d470\u003e] (data_from_chip+0xf4/0xaec)\n[\u003cc040d470\u003e] (data_from_chip+0xf4/0xaec) from [\u003cc04136c0\u003e] (send_skb_to_core+0x40/0x178)\n[\u003cc04136c0\u003e] (send_skb_to_core+0x40/0x178) from [\u003cc04139f4\u003e] (cg2900_hu_receive+0x15c/0x2d0)\n[\u003cc04139f4\u003e] (cg2900_hu_receive+0x15c/0x2d0) from [\u003cc0414cb8\u003e] (hci_uart_tty_receive+0x74/0xa0)\n[\u003cc0414cb8\u003e] (hci_uart_tty_receive+0x74/0xa0) from [\u003cc02cbd9c\u003e] (flush_to_ldisc+0x188/0x198)\n[\u003cc02cbd9c\u003e] (flush_to_ldisc+0x188/0x198) from [\u003cc00b2774\u003e] (process_one_work+0x144/0x4b8)\n[\u003cc00b2774\u003e] (process_one_work+0x144/0x4b8) from [\u003cc00b2e8c\u003e] (worker_thread+0x198/0x468)\n[\u003cc00b2e8c\u003e] (worker_thread+0x198/0x468) from [\u003cc00b9bc8\u003e] (kthread+0x98/0xa0)\n[\u003cc00b9bc8\u003e] (kthread+0x98/0xa0) from [\u003cc0061744\u003e] (kernel_thread_exit+0x0/0x8)\n\nSigned-off-by: Szymon Janc \u003cszymon.janc@tieto.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "449357200c5d73d80a9c42dee5dafed684b3cd17",
      "tree": "333e387c99dc8cd03d334e61f1a5147b4e5bd8f9",
      "parents": [
        "9fd481e03c1e9c76c814b88b9ea1cbda9afb0812"
      ],
      "author": {
        "name": "Mat Martineau",
        "email": "mathewm@codeaurora.org",
        "time": "Fri Jul 22 14:53:58 2011 -0700"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "gustavo@padovan.org",
        "time": "Tue Sep 27 18:15:55 2011 -0300"
      },
      "message": "Bluetooth: Linearize skbs for use in BNEP, CMTP, HIDP, and RFCOMM\n\nFragmented skbs are only encountered when receiving ERTM or streaming\nmode L2CAP data.  BNEP, CMTP, HIDP, and RFCOMM generally use basic\nmode, but they need to handle fragments without crashing.\n\nSigned-off-by: Mat Martineau \u003cmathewm@codeaurora.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "950e2d51e866623e4c360280aa63b85ab66d3403",
      "tree": "7852a1ed5415b0e4e2ba328249658edfca2ee0af",
      "parents": [
        "e5842cdb0f4f2c68f6acd39e286e5d10d8c073e8"
      ],
      "author": {
        "name": "Peter Hurley",
        "email": "peter@hurleysoftware.com",
        "time": "Sun Jul 24 00:10:41 2011 -0400"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Aug 11 19:50:26 2011 -0300"
      },
      "message": "Bluetooth: rfcomm: Fix lost wakeups waiting to accept socket\n\nFix race conditions which can cause lost wakeups (or missed\nsignals) while waiting to accept an rfcomm socket connection.\n\nSigned-off-by: Peter Hurley \u003cpeter@hurleysoftware.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "e5842cdb0f4f2c68f6acd39e286e5d10d8c073e8",
      "tree": "a7823b87a19c6f865221b0fb9553202a4da241a3",
      "parents": [
        "8e7c3d2e4ba18ee4cdcc1f89aec944fbff4ce735"
      ],
      "author": {
        "name": "Peter Hurley",
        "email": "peter@hurleysoftware.com",
        "time": "Sun Jul 24 00:10:35 2011 -0400"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Aug 11 19:50:26 2011 -0300"
      },
      "message": "Bluetooth: rfcomm: Remove unnecessary krfcommd event\n\nRemoved superfluous event handling which was used to signal\nthat the rfcomm kthread had been woken. This appears to have been\nused to prevent lost wakeups. Correctly ordering when the task\nstate is set to TASK_INTERRUPTIBLE is sufficient to prevent lost wakeups.\n\nTo prevent wakeups which occurred prior to initially setting\nTASK_INTERRUPTIBLE from being lost, the main work of the thread loop -\nrfcomm_process_sessions() - is performed prior to sleeping.\n\nSigned-off-by: Peter Hurley \u003cpeter@hurleysoftware.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "448f2627c169092d2091a1be22feb6a7775f6201",
      "tree": "8d12460ba978d4f031715ae4bd9e0bc6fee4c5ab",
      "parents": [
        "5a9d0a3ffbc40ea1f5a0636501e7599cbb327bcc",
        "6de6c18d8d3b2a82cc1c657f005e61b1c1f2f886"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Jun 09 16:33:54 2011 -0300"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Jun 09 16:33:54 2011 -0300"
      },
      "message": "Merge master.kernel.org:/pub/scm/linux/kernel/git/padovan/bluetooth-2.6\n\nConflicts:\n\tnet/bluetooth/rfcomm/sock.c\n"
    },
    {
      "commit": "d0fad89da9801b3945d2ee7243ecbc75b3da6f09",
      "tree": "358b76d683dee4a01a1dda77ce7f660e5b8c0a05",
      "parents": [
        "8d03e971cf403305217b8e62db3a2e5ad2d6263f"
      ],
      "author": {
        "name": "Stephen Boyd",
        "email": "sboyd@codeaurora.org",
        "time": "Thu May 12 16:50:09 2011 -0700"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Jun 09 15:30:01 2011 -0300"
      },
      "message": "Bluetooth: Silence DEBUG_STRICT_USER_COPY_CHECKS\u003dy warning\n\nEnabling DEBUG_STRICT_USER_COPY_CHECKS causes the following\nwarning:\n\nIn function \u0027copy_from_user\u0027,\n    inlined from \u0027rfcomm_sock_setsockopt\u0027 at\n    net/bluetooth/rfcomm/sock.c:705:\narch/x86/include/asm/uaccess_64.h:65:\nwarning: call to \u0027copy_from_user_overflow\u0027 declared with\nattribute warning: copy_from_user() buffer size is not provably\ncorrect\n\npresumably due to buf_size being signed causing GCC to fail to\nsee that buf_size can\u0027t become negative.\n\nCc: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nCc: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\nSigned-off-by: Stephen Boyd \u003csboyd@codeaurora.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "8d03e971cf403305217b8e62db3a2e5ad2d6263f",
      "tree": "849bb2e439234c63480c6485a3b663a3377cfd21",
      "parents": [
        "51892dbbd511911c0f965a36b431fc3e8f1e4f8a"
      ],
      "author": {
        "name": "Filip Palian",
        "email": "s3810@pjwstk.edu.pl",
        "time": "Thu May 12 19:32:46 2011 +0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Jun 09 15:30:01 2011 -0300"
      },
      "message": "Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace.\n\nStructures \"l2cap_conninfo\" and \"rfcomm_conninfo\" have one padding\nbyte each. This byte in \"cinfo\" is copied to userspace uninitialized.\n\nSigned-off-by: Filip Palian \u003cfilip.palian@pjwstk.edu.pl\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "75fde9ee1bca0c0c004aadaebdedf17370f93f18",
      "tree": "e36a852065a41a63be4133323c86dc20edbdfda5",
      "parents": [
        "78676a06260a4162b6837a8a2fb954445004ebc2"
      ],
      "author": {
        "name": "David Miller",
        "email": "davem@davemloft.net",
        "time": "Thu May 19 18:09:00 2011 -0400"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Wed Jun 08 16:58:15 2011 -0300"
      },
      "message": "Bluetooth: Kill set but not used variable \u0027l2cap_sk\u0027 in rfcomm_sock_getsockopt_old()\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "b3b1b061583ba4909b59a2f736825d86495fe956",
      "tree": "95ae8fcbcc37bfb3865362ddcd72ac76d2b58c0b",
      "parents": [
        "2a7bccccdb9604a717c2128a931f022267d35629"
      ],
      "author": {
        "name": "Waldemar Rymarkiewicz",
        "email": "waldemar.rymarkiewicz@tieto.com",
        "time": "Fri May 06 09:42:31 2011 +0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Wed May 11 14:56:28 2011 -0300"
      },
      "message": "Bluetooth: Double check sec req for pre 2.1 device\n\nIn case of pre v2.1 devices authentication request will return\nsuccess immediately if the link key already exists without any\nauthentication process.\n\nThat means, it\u0027s not possible to re-authenticate the link if you\nalready have combination key and for instance want to re-authenticate\nto get the high security (use 16 digit pin).\n\nTherefore, it\u0027s necessary to check security requirements on auth\ncomplete event to prevent not enough secure connection.\n\nSigned-off-by: Waldemar Rymarkiewicz \u003cwaldemar.rymarkiewicz@tieto.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "8c1d787be4b62d2d1b6f04953eca4bcf7c839d44",
      "tree": "e2a35c5cb81cc5109c13c2747b039fa05ea55a6e",
      "parents": [
        "fe4128e0aabc3c748786c00da21e6eff9d3aeddb"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Wed Apr 13 20:23:55 2011 -0300"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Apr 28 01:10:00 2011 -0300"
      },
      "message": "Bluetooth: Move conn to struct l2cap_chan\n\nThere is no need to the socket deal directly with the channel, most of the\ntime it cares about the channel only.\n\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "0c1bc5c626e9783034264ccca4b262b3acc628f1",
      "tree": "ca6c9ecaf753ec9892d3cec078c63723299e01fb",
      "parents": [
        "47d1ec6161da2c7b9dbc56a5200fa26b17d5fdc1"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Wed Apr 13 17:20:49 2011 -0300"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Apr 28 01:09:58 2011 -0300"
      },
      "message": "Bluetooth: Move more channel info to struct l2cap_chan\n\nIn this commit, omtu, imtu, flush_to, mode and sport. It also remove the\npi var from l2cap_sock_sendmsg().\n\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "47d1ec6161da2c7b9dbc56a5200fa26b17d5fdc1",
      "tree": "7f7c5288d420cf84cf38ba55ca36bcc052066e92",
      "parents": [
        "4343478f3a4806394136d8141b2e451aa5443f03"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Wed Apr 13 15:57:03 2011 -0300"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Wed Apr 27 18:51:35 2011 -0300"
      },
      "message": "Bluetooth: Move more vars to struct l2cap_chan\n\nIn this commit all ERTM and Streaming Mode specific vars.\n\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "7a6362800cb7d1d618a697a650c7aaed3eb39320",
      "tree": "087f9bc6c13ef1fad4b392c5cf9325cd28fa8523",
      "parents": [
        "6445ced8670f37cfc2c5e24a9de9b413dbfc788d",
        "ceda86a108671294052cbf51660097b6534672f5"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Mar 16 16:29:25 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Mar 16 16:29:25 2011 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6: (1480 commits)\n  bonding: enable netpoll without checking link status\n  xfrm: Refcount destination entry on xfrm_lookup\n  net: introduce rx_handler results and logic around that\n  bonding: get rid of IFF_SLAVE_INACTIVE netdev-\u003epriv_flag\n  bonding: wrap slave state work\n  net: get rid of multiple bond-related netdevice-\u003epriv_flags\n  bonding: register slave pointer for rx_handler\n  be2net: Bump up the version number\n  be2net: Copyright notice change. Update to Emulex instead of ServerEngines\n  e1000e: fix kconfig for crc32 dependency\n  netfilter ebtables: fix xt_AUDIT to work with ebtables\n  xen network backend driver\n  bonding: Improve syslog message at device creation time\n  bonding: Call netif_carrier_off after register_netdevice\n  bonding: Incorrect TX queue offset\n  net_sched: fix ip_tos2prio\n  xfrm: fix __xfrm_route_forward()\n  be2net: Fix UDP packet detected status in RX compl\n  Phonet: fix aligned-mode pipe socket buffer header reserve\n  netxen: support for GbE port settings\n  ...\n\nFix up conflicts in drivers/staging/brcm80211/brcmsmac/wl_mac80211.c\nwith the staging updates.\n"
    },
    {
      "commit": "e6bee325e49f17c65c1fd66e9e8b348c85788341",
      "tree": "bcc9e5d8e82efa9009edd481a837cc3626360091",
      "parents": [
        "a5e6b135bdff649e4330f98e2e80dbb1984f7e77",
        "6ae705b23be8da52d3163be9d81e9b767876aaf9"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Mar 16 15:11:04 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Mar 16 15:11:04 2011 -0700"
      },
      "message": "Merge branch \u0027tty-next\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty-2.6\n\n* \u0027tty-next\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty-2.6: (76 commits)\n  pch_uart: reference clock on CM-iTC\n  pch_phub: add new device ML7213\n  n_gsm: fix UIH control byte : P bit should be 0\n  n_gsm: add a documentation\n  serial: msm_serial_hs: Add MSM high speed UART driver\n  tty_audit: fix tty_audit_add_data live lock on audit disabled\n  tty: move cd1865.h to drivers/staging/tty/\n  Staging: tty: fix build with epca.c driver\n  pcmcia: synclink_cs: fix prototype for mgslpc_ioctl()\n  Staging: generic_serial: fix double locking bug\n  nozomi: don\u0027t use flush_scheduled_work()\n  tty/serial: Relax the device_type restriction from of_serial\n  MAINTAINERS: Update HVC file patterns\n  tty: phase out of ioctl file pointer for tty3270 as well\n  tty: forgot to remove ipwireless from drivers/char/pcmcia/Makefile\n  pch_uart: Fix DMA channel miss-setting issue.\n  pch_uart: fix exclusive access issue\n  pch_uart: fix auto flow control miss-setting issue\n  pch_uart: fix uart clock setting issue\n  pch_uart : Use dev_xxx not pr_xxx\n  ...\n\nFix up trivial conflicts in drivers/misc/pch_phub.c (same patch applied\ntwice, then changes to the same area in one branch)\n"
    },
    {
      "commit": "b67afe7f43afd2f5cd98798993561920c1684c12",
      "tree": "e45a0e41c91a1d199fd865b011ed0d25f5497bb9",
      "parents": [
        "db28569adc692d9fb8a2d2d8e7ebab7fd5481f10",
        "28bec7b845e10b68e6ba1ade5de0fc566690fc61"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Fri Feb 18 17:03:41 2011 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Fri Feb 18 17:03:41 2011 -0500"
      },
      "message": "Merge ssh://master.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n\nConflicts:\n\tdrivers/bluetooth/ath3k.c\n\tdrivers/bluetooth/btusb.c\n"
    },
    {
      "commit": "6caa76b7786891b42b66a0e61e2c2fff2c884620",
      "tree": "eb6e387e080a44680d6d8686999336e69ec97e71",
      "parents": [
        "00a0d0d65b61241a718d0aee96f46b9a2d93bf26"
      ],
      "author": {
        "name": "Alan Cox",
        "email": "alan@linux.intel.com",
        "time": "Mon Feb 14 16:27:22 2011 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@suse.de",
        "time": "Thu Feb 17 11:59:56 2011 -0800"
      },
      "message": "tty: now phase out the ioctl file pointer for good\n\nOnly oddities here are a couple of drivers that bogusly called the ldisc\nhelpers instead of returning -ENOIOCTLCMD. Fix the bug and the rest goes\naway.\n\nSigned-off-by: Alan Cox \u003calan@linux.intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@suse.de\u003e\n"
    },
    {
      "commit": "20b9d17715017ae4dd4ec87fabc36d33b9de708e",
      "tree": "64e9c4ff845844298f9056357d9f4914802207f8",
      "parents": [
        "60b33c133ca0b7c0b6072c87234b63fee6e80558"
      ],
      "author": {
        "name": "Alan Cox",
        "email": "alan@linux.intel.com",
        "time": "Mon Feb 14 16:26:50 2011 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@suse.de",
        "time": "Thu Feb 17 11:52:43 2011 -0800"
      },
      "message": "tiocmset: kill the file pointer argument\n\nDoing tiocmget was such fun we should do tiocmset as well for the same\nreasons\n\nSigned-off-by: Alan Cox \u003calan@linux.intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@suse.de\u003e\n"
    },
    {
      "commit": "60b33c133ca0b7c0b6072c87234b63fee6e80558",
      "tree": "379340a7ab563df42ddb2907be6f282202244077",
      "parents": [
        "adf9251fe9b87b5a50deebe489db2df8df4715fc"
      ],
      "author": {
        "name": "Alan Cox",
        "email": "alan@linux.intel.com",
        "time": "Mon Feb 14 16:26:14 2011 +0000"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@suse.de",
        "time": "Thu Feb 17 11:47:33 2011 -0800"
      },
      "message": "tiocmget: kill off the passing of the struct file\n\nWe don\u0027t actually need this and it causes problems for internal use of\nthis functionality. Currently there is a single use of the FILE * pointer.\nThat is the serial core which uses it to check tty_hung_up_p. However if\nthat is true then IO_ERROR is also already set so the check may be removed.\n\nSigned-off-by: Alan Cox \u003calan@linux.intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@suse.de\u003e\n"
    },
    {
      "commit": "840af824b2bf9194ea596e0ddc7aa05066794ca1",
      "tree": "e10fe7e455b9a4aaadf56cb3f0c0325208bc0118",
      "parents": [
        "8efdd0cdc54f3bb5db464b3baf88f7441f54da47"
      ],
      "author": {
        "name": "Vladislav P",
        "email": "vladisslav@inbox.ru",
        "time": "Mon Feb 14 15:21:50 2011 -0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Wed Feb 16 15:54:11 2011 -0300"
      },
      "message": "Bluetooth: Release BTM while sleeping to avoid deadlock\n\nSigned-off-by: Vladislav P \u003cvladisslav@inbox.ru\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "c531a12ae63b6438a7859994aca23859f5706010",
      "tree": "fc32fd04015270067db585207e91a26f5498ab4f",
      "parents": [
        "642745184f82688eb3ef0cdfaa4ba632055be9af"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Feb 07 20:19:30 2011 -0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Tue Feb 15 09:45:52 2011 -0300"
      },
      "message": "Bluetooth: remove l2cap_load() hack\n\nl2cap_load() was added to trigger l2cap.ko module loading from the RFCOMM\nand BNEP modules. Now that L2CAP module is gone, we don\u0027t need it anymore.\n\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "683d949a7fbf33c244670e34d35c460e0d6558cb",
      "tree": "fafa2f5c18d72466e859e7ade3f6a84d84bb7224",
      "parents": [
        "e2e0cacbd4b0c7c69c7591d37c243f2363aeaa71"
      ],
      "author": {
        "name": "Lukáš Turek",
        "email": "8an@praha12.net",
        "time": "Wed Jan 05 02:43:59 2011 +0100"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Wed Jan 19 14:40:42 2011 -0200"
      },
      "message": "Bluetooth: Never deallocate a session when some DLC points to it\n\nFix a bug introduced in commit 9cf5b0ea3a7f1432c61029f7aaf4b8b338628884:\nfunction rfcomm_recv_ua calls rfcomm_session_put without checking that\nthe session is not referenced by some DLC. If the session is freed, that\nDLC would refer to deallocated memory, causing an oops later, as shown\nin this bug report: https://bugzilla.kernel.org/show_bug.cgi?id\u003d15994\n\nSigned-off-by: Lukas Turek \u003c8an@praha12.net\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "b4aa9e05a61b845541fa6f5b1d246976922601f0",
      "tree": "ca94478c3df281ab76a3399f5ba6341ade3f5791",
      "parents": [
        "1dc0f3c54ce1df957f99c17b145488fd03eb1a59",
        "4b8fe66300acb2fba8b16d62606e0d30204022fc"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Dec 17 12:27:22 2010 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Dec 17 12:27:22 2010 -0800"
      },
      "message": "Merge branch \u0027master\u0027 of master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6\n\nConflicts:\n\tdrivers/net/bnx2x/bnx2x.h\n\tdrivers/net/wireless/iwlwifi/iwl-1000.c\n\tdrivers/net/wireless/iwlwifi/iwl-6000.c\n\tdrivers/net/wireless/iwlwifi/iwl-core.h\n\tdrivers/vhost/vhost.c\n"
    },
    {
      "commit": "183f732c3f3f307d5673e17b69de6894e1dd2918",
      "tree": "3c5641374b15ee4a31b28cbdc071356058065436",
      "parents": [
        "d89197c7f34934fbb0f96d938a0d6cfe0b8bcb1c"
      ],
      "author": {
        "name": "Johan Hedberg",
        "email": "johan.hedberg@nokia.com",
        "time": "Mon Dec 06 15:56:17 2010 +0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Dec 06 15:47:44 2010 -0200"
      },
      "message": "Bluetooth: Fix initial RFCOMM DLC security level\n\nDue to commit 63ce0900 connections initiated through TTYs created with\n\"rfcomm bind ...\" would have security level BT_SECURITY_SDP instead of\nBT_SECURITY_LOW. This would cause instant connection failure between any\ntwo SSP capable devices due to the L2CAP connect request to RFCOMM being\nsent before authentication has been performed. This patch fixes the\nregression by always initializing the DLC security level to\nBT_SECURITY_LOW.\n\nSigned-off-by: Johan Hedberg \u003cjohan.hedberg@nokia.com\u003e\nAcked-by: Luiz Augusto von Dentz \u003cluiz.dentz-von@nokia.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "285b4e90318dcf421a00b2ac3fe8ab713f3281e3",
      "tree": "2f69b35603f0c68288e364cc41de96e502ee511b",
      "parents": [
        "735cbc4784a084b7a76c43c69f9dba683bb3b48b"
      ],
      "author": {
        "name": "Andrei Emeltchenko",
        "email": "andrei.emeltchenko@nokia.com",
        "time": "Wed Dec 01 16:58:23 2010 +0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Wed Dec 01 21:04:43 2010 -0200"
      },
      "message": "Bluetooth: clean up rfcomm code\n\nRemove extra spaces, assignments in if statement, zeroing static\nvariables, extra braces. Fix includes.\n\nSigned-off-by: Andrei Emeltchenko \u003candrei.emeltchenko@nokia.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "eeb366564be7c311b31c70821d18a43a8a57f9bc",
      "tree": "7378939c2d8be9356620d1d08a170b1c7f9f9759",
      "parents": [
        "e0f0cb56364958223f0cb1f1b0b0eecf1b8dcb95"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Mon Nov 01 18:43:53 2010 +0000"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Wed Dec 01 21:04:43 2010 -0200"
      },
      "message": "Bluetooth: Get rid of __rfcomm_get_sock_by_channel()\n\nrfcomm_get_sock_by_channel() was the only user of this function, so I merged\nboth into rfcomm_get_sock_by_channel(). The socket lock now should be hold\noutside of rfcomm_get_sock_by_channel() once we hold and release it inside the\nsame function now.\n\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "63ce0900d79645c714de6c8b66d8040670068c9e",
      "tree": "02bd4f20262db74e45fdd431bf5e8d0c18cf314e",
      "parents": [
        "4f8b691c9fb02e72359e71592098c1de3b8ec712"
      ],
      "author": {
        "name": "Luiz Augusto von Dentz",
        "email": "luiz.dentz-von@nokia.com",
        "time": "Thu Aug 19 14:06:10 2010 +0300"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Tue Nov 09 00:56:10 2010 -0200"
      },
      "message": "Bluetooth: fix not setting security level when creating a rfcomm session\n\nThis cause \u0027No Bonding\u0027 to be used if userspace has not yet been paired\nwith remote device since the l2cap socket used to create the rfcomm\nsession does not have any security level set.\n\nSigned-off-by: Luiz Augusto von Dentz \u003cluiz.dentz-von@nokia.com\u003e\nAcked-by: Ville Tervo \u003cville.tervo@nokia.com\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "5f05647dd81c11a6a165ccc8f0c1370b16f3bcb0",
      "tree": "7851ef1c93aa1aba7ef327ca4b75fd35e6d10f29",
      "parents": [
        "02f36038c568111ad4fc433f6fa760ff5e38fab4",
        "ec37a48d1d16c30b655ac5280209edf52a6775d4"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sat Oct 23 11:47:02 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sat Oct 23 11:47:02 2010 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6: (1699 commits)\n  bnx2/bnx2x: Unsupported Ethtool operations should return -EINVAL.\n  vlan: Calling vlan_hwaccel_do_receive() is always valid.\n  tproxy: use the interface primary IP address as a default value for --on-ip\n  tproxy: added IPv6 support to the socket match\n  cxgb3: function namespace cleanup\n  tproxy: added IPv6 support to the TPROXY target\n  tproxy: added IPv6 socket lookup function to nf_tproxy_core\n  be2net: Changes to use only priority codes allowed by f/w\n  tproxy: allow non-local binds of IPv6 sockets if IP_TRANSPARENT is enabled\n  tproxy: added tproxy sockopt interface in the IPV6 layer\n  tproxy: added udp6_lib_lookup function\n  tproxy: added const specifiers to udp lookup functions\n  tproxy: split off ipv6 defragmentation to a separate module\n  l2tp: small cleanup\n  nf_nat: restrict ICMP translation for embedded header\n  can: mcp251x: fix generation of error frames\n  can: mcp251x: fix endless loop in interrupt handler if CANINTF_MERRF is set\n  can-raw: add msg_flags to distinguish local traffic\n  9p: client code cleanup\n  rds: make local functions/variables static\n  ...\n\nFix up conflicts in net/core/dev.c, drivers/net/pcmcia/smc91c92_cs.c and\ndrivers/net/wireless/ath/ath9k/debug.c as per David\n"
    },
    {
      "commit": "0587102cf9f427c185bfdeb2cef41e13ee0264b1",
      "tree": "94c6dcc7ac230dee166d2f6aa1f9a54bffe5764b",
      "parents": [
        "0bca1b913affbd7e2fdaffee62a499659a466eb5"
      ],
      "author": {
        "name": "Alan Cox",
        "email": "alan@linux.intel.com",
        "time": "Thu Sep 16 18:21:52 2010 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@suse.de",
        "time": "Fri Oct 22 10:20:05 2010 -0700"
      },
      "message": "tty: icount changeover for other main devices\n\nAgain basically cut and paste\n\nConvert the main driver set to use the hooks for GICOUNT\n\nSigned-off-by: Alan Cox \u003calan@linux.intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@suse.de\u003e\n\n\n"
    },
    {
      "commit": "534c92fde74c8d2143fc15b5f1d957f42cb43570",
      "tree": "1f6fe4dcf8bebd4b8313357036614900f289aab2",
      "parents": [
        "ab3e571564a5d8fa4923e2e858e574c931a014c7"
      ],
      "author": {
        "name": "Andrei Emeltchenko",
        "email": "andrei.emeltchenko@nokia.com",
        "time": "Fri Oct 01 12:05:11 2010 +0300"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Tue Oct 12 12:44:53 2010 -0300"
      },
      "message": "Bluetooth: clean up rfcomm code\n\nRemove dead code and unused rfcomm thread events\n\nSigned-off-by: Andrei Emeltchenko \u003candrei.emeltchenko@nokia.com\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "d6b2eb2f893547d7488d31a7088d78dd77ab5995",
      "tree": "fd632fa1316348a928bfc4dce7fbdb02b209467f",
      "parents": [
        "cb810a189da312d4074cb3fc8b0267b7115e7be1"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Fri Sep 03 18:29:46 2010 -0300"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Tue Oct 12 12:44:52 2010 -0300"
      },
      "message": "Bluetooth: make batostr() print in the right order\n\nThe Bluetooth core uses the the BD_ADDR in the opposite order from the\nhuman readable order. So we are changing batostr() to print in the\ncorrect order and then removing some baswap(), as they are not needed\nanymore.\n\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "5017d8dde13313cab1e607379536a7930ed682b0",
      "tree": "3d39942d30586317465b78be28251455caadcad0",
      "parents": [
        "6fdf482bb3298267816be59d9a3dce29632382d3"
      ],
      "author": {
        "name": "Andrei Emeltchenko",
        "email": "andrei.emeltchenko@nokia.com",
        "time": "Wed Sep 08 16:26:53 2010 +0300"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Tue Oct 12 12:44:51 2010 -0300"
      },
      "message": "Bluetooth: remove extra newline from debug output\n\nSigned-off-by: Andrei Emeltchenko \u003candrei.emeltchenko@nokia.com\u003e\nAcked-by: Ville Tervo \u003cville.tervo@nokia.com\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "3d7d01dffec4a6757ed1e3182f01c7ef5caa2539",
      "tree": "0903ad1ffcf4378fd5f3d33716fc37d7059998b0",
      "parents": [
        "796c86eec84ddfd02281c5071838ed1fefda6b90"
      ],
      "author": {
        "name": "Mat Martineau",
        "email": "mathewm@codeaurora.org",
        "time": "Wed Sep 08 10:05:28 2010 -0700"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Tue Oct 12 12:44:51 2010 -0300"
      },
      "message": "Bluetooth: Use common SOCK_STREAM receive code in RFCOMM\n\nTo reduce code duplication, have rfcomm_sock_recvmsg() call\nbt_sock_stream_recvmsg().  The common bt_sock_stream_recvmsg()\ncode is nearly identical, with the RFCOMM-specific functionality\nfor deferred setup and connection unthrottling left in\nrfcomm_sock_recvmsg().\n\nSigned-off-by: Mat Martineau \u003cmathewm@codeaurora.org\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "08601469a5aac8b3453d8aca0b8f9bd8dfdae12c",
      "tree": "90a126bf8bd9c56fad847c684384c715df329c49",
      "parents": [
        "fb3d8eb47ce377d6d7a8fc58b8046ea9eb376a28"
      ],
      "author": {
        "name": "Yuri Kululin",
        "email": "ext-yuri.kululin@nokia.com",
        "time": "Fri Jul 23 13:57:12 2010 +0400"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Tue Oct 12 12:44:51 2010 -0300"
      },
      "message": "Bluetooth: Fix RFCOMM RPN negotiation\n\nAccording to the ETSI 3GPP TS 07.10 the default bit rate value for RFCOMM\nis 9600 bit/s. Return this bit rate in case of RPN request and accept other\nsane bit rates proposed by the sender in RPM command.\n\nSigned-off-by: Yuri Kululin \u003cext-yuri.kululin@nokia.com\u003e\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "d122179a3c0fdc71b88cb9e3605f372b1651a9ff",
      "tree": "63a48b333e7565967b6d7c9e246557bfcb9f225f",
      "parents": [
        "419c20465d6319274e7286f0966e2390540e6e0a",
        "b00916b189d13a615ff05c9242201135992fcda3"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 11 12:30:34 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 11 12:30:34 2010 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6\n\nConflicts:\n\tnet/core/ethtool.c\n"
    },
    {
      "commit": "fad003b6c8e3d944d4453fd569b0702ef1af82b3",
      "tree": "d9fd2ec91b39283458ac64e31ae7775ae6ee87ec",
      "parents": [
        "ccbb84af28594e19fd4bf27ff2828c80d03b6081"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Sat Aug 14 00:48:07 2010 -0300"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Sep 30 12:19:35 2010 -0300"
      },
      "message": "Bluetooth: Fix inconsistent lock state with RFCOMM\n\nWhen receiving a rfcomm connection with the old dund deamon a\ninconsistent lock state happens. That\u0027s because interrupts were already\ndisabled by l2cap_conn_start() when rfcomm_sk_state_change() try to lock\nthe spin_lock.\n\nAs result we may have a inconsistent lock state for l2cap_conn_start()\nafter rfcomm_sk_state_change() calls bh_lock_sock() and disable interrupts\nas well.\n\n[ 2833.151999]\n[ 2833.151999] \u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n[ 2833.151999] [ INFO: inconsistent lock state ]\n[ 2833.151999] 2.6.36-rc3 #2\n[ 2833.151999] ---------------------------------\n[ 2833.151999] inconsistent {IN-SOFTIRQ-W} -\u003e {SOFTIRQ-ON-W} usage.\n[ 2833.151999] krfcommd/2306 [HC0[0]:SC0[0]:HE1:SE1] takes:\n[ 2833.151999]  (slock-AF_BLUETOOTH){+.?...}, at: [\u003cffffffffa00bcb56\u003e] rfcomm_sk_state_change+0x46/0x170 [rfcomm]\n[ 2833.151999] {IN-SOFTIRQ-W} state was registered at:\n[ 2833.151999]   [\u003cffffffff81094346\u003e] __lock_acquire+0x5b6/0x1560\n[ 2833.151999]   [\u003cffffffff8109534a\u003e] lock_acquire+0x5a/0x70\n[ 2833.151999]   [\u003cffffffff81392b6c\u003e] _raw_spin_lock+0x2c/0x40\n[ 2833.151999]   [\u003cffffffffa00a5092\u003e] l2cap_conn_start+0x92/0x640 [l2cap]\n[ 2833.151999]   [\u003cffffffffa00a6a3f\u003e] l2cap_sig_channel+0x6bf/0x1320 [l2cap]\n[ 2833.151999]   [\u003cffffffffa00a9173\u003e] l2cap_recv_frame+0x133/0x770 [l2cap]\n[ 2833.151999]   [\u003cffffffffa00a997b\u003e] l2cap_recv_acldata+0x1cb/0x390 [l2cap]\n[ 2833.151999]   [\u003cffffffffa000db4b\u003e] hci_rx_task+0x2ab/0x450 [bluetooth]\n[ 2833.151999]   [\u003cffffffff8106b22b\u003e] tasklet_action+0xcb/0xe0\n[ 2833.151999]   [\u003cffffffff8106b91e\u003e] __do_softirq+0xae/0x150\n[ 2833.151999]   [\u003cffffffff8102bc0c\u003e] call_softirq+0x1c/0x30\n[ 2833.151999]   [\u003cffffffff8102ddb5\u003e] do_softirq+0x75/0xb0\n[ 2833.151999]   [\u003cffffffff8106b56d\u003e] irq_exit+0x8d/0xa0\n[ 2833.151999]   [\u003cffffffff8104484b\u003e] smp_apic_timer_interrupt+0x6b/0xa0\n[ 2833.151999]   [\u003cffffffff8102b6d3\u003e] apic_timer_interrupt+0x13/0x20\n[ 2833.151999]   [\u003cffffffff81029dfa\u003e] cpu_idle+0x5a/0xb0\n[ 2833.151999]   [\u003cffffffff81381ded\u003e] rest_init+0xad/0xc0\n[ 2833.151999]   [\u003cffffffff817ebc4d\u003e] start_kernel+0x2dd/0x2e8\n[ 2833.151999]   [\u003cffffffff817eb2e6\u003e] x86_64_start_reservations+0xf6/0xfa\n[ 2833.151999]   [\u003cffffffff817eb3ce\u003e] x86_64_start_kernel+0xe4/0xeb\n[ 2833.151999] irq event stamp: 731\n[ 2833.151999] hardirqs last  enabled at (731): [\u003cffffffff8106b762\u003e] local_bh_enable_ip+0x82/0xe0\n[ 2833.151999] hardirqs last disabled at (729): [\u003cffffffff8106b93e\u003e] __do_softirq+0xce/0x150\n[ 2833.151999] softirqs last  enabled at (730): [\u003cffffffff8106b96e\u003e] __do_softirq+0xfe/0x150\n[ 2833.151999] softirqs last disabled at (711): [\u003cffffffff8102bc0c\u003e] call_softirq+0x1c/0x30\n[ 2833.151999]\n[ 2833.151999] other info that might help us debug this:\n[ 2833.151999] 2 locks held by krfcommd/2306:\n[ 2833.151999]  #0:  (rfcomm_mutex){+.+.+.}, at: [\u003cffffffffa00bb744\u003e] rfcomm_run+0x174/0xb20 [rfcomm]\n[ 2833.151999]  #1:  (\u0026(\u0026d-\u003elock)-\u003erlock){+.+...}, at: [\u003cffffffffa00b9223\u003e] rfcomm_dlc_accept+0x53/0x100 [rfcomm]\n[ 2833.151999]\n[ 2833.151999] stack backtrace:\n[ 2833.151999] Pid: 2306, comm: krfcommd Tainted: G        W   2.6.36-rc3 #2\n[ 2833.151999] Call Trace:\n[ 2833.151999]  [\u003cffffffff810928e1\u003e] print_usage_bug+0x171/0x180\n[ 2833.151999]  [\u003cffffffff810936c3\u003e] mark_lock+0x333/0x400\n[ 2833.151999]  [\u003cffffffff810943ca\u003e] __lock_acquire+0x63a/0x1560\n[ 2833.151999]  [\u003cffffffff810948b5\u003e] ? __lock_acquire+0xb25/0x1560\n[ 2833.151999]  [\u003cffffffff8109534a\u003e] lock_acquire+0x5a/0x70\n[ 2833.151999]  [\u003cffffffffa00bcb56\u003e] ? rfcomm_sk_state_change+0x46/0x170 [rfcomm]\n[ 2833.151999]  [\u003cffffffff81392b6c\u003e] _raw_spin_lock+0x2c/0x40\n[ 2833.151999]  [\u003cffffffffa00bcb56\u003e] ? rfcomm_sk_state_change+0x46/0x170 [rfcomm]\n[ 2833.151999]  [\u003cffffffffa00bcb56\u003e] rfcomm_sk_state_change+0x46/0x170 [rfcomm]\n[ 2833.151999]  [\u003cffffffffa00b9239\u003e] rfcomm_dlc_accept+0x69/0x100 [rfcomm]\n[ 2833.151999]  [\u003cffffffffa00b9a49\u003e] rfcomm_check_accept+0x59/0xd0 [rfcomm]\n[ 2833.151999]  [\u003cffffffffa00bacab\u003e] rfcomm_recv_frame+0x9fb/0x1320 [rfcomm]\n[ 2833.151999]  [\u003cffffffff813932bb\u003e] ? _raw_spin_unlock_irqrestore+0x3b/0x60\n[ 2833.151999]  [\u003cffffffff81093acd\u003e] ? trace_hardirqs_on_caller+0x13d/0x180\n[ 2833.151999]  [\u003cffffffff81093b1d\u003e] ? trace_hardirqs_on+0xd/0x10\n[ 2833.151999]  [\u003cffffffffa00bb7f1\u003e] rfcomm_run+0x221/0xb20 [rfcomm]\n[ 2833.151999]  [\u003cffffffff813905e7\u003e] ? schedule+0x287/0x780\n[ 2833.151999]  [\u003cffffffffa00bb5d0\u003e] ? rfcomm_run+0x0/0xb20 [rfcomm]\n[ 2833.151999]  [\u003cffffffff81081026\u003e] kthread+0x96/0xa0\n[ 2833.151999]  [\u003cffffffff8102bb14\u003e] kernel_thread_helper+0x4/0x10\n[ 2833.151999]  [\u003cffffffff813936bc\u003e] ? restore_args+0x0/0x30\n[ 2833.151999]  [\u003cffffffff81080f90\u003e] ? kthread+0x0/0xa0\n[ 2833.151999]  [\u003cffffffff8102bb10\u003e] ? kernel_thread_helper+0x0/0x10\n\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "a02cec2155fbea457eca8881870fd2de1a4c4c76",
      "tree": "cfbfc4b32bfe10f9cd803d46c31607d13f1858f5",
      "parents": [
        "6a08d194ee40806e0ccd5f36ed768e64cbfc979f"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed Sep 22 20:43:57 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Sep 23 14:33:39 2010 -0700"
      },
      "message": "net: return operator cleanup\n\nChange \"return (EXPR);\" to \"return EXPR;\"\n\nreturn is not a function, parentheses are not required.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "28e9509b1270e5cfa8bb3c5ff51f39214aa09262",
      "tree": "04d78ebd2c6f3dfcd588e6dfd5820772364213c4",
      "parents": [
        "ea4bd8ba804dedefa65303b3bd105d6d2808e621"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Sat Jul 31 19:57:05 2010 -0300"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sat Jul 31 16:09:21 2010 -0700"
      },
      "message": "Bluetooth: Remove __exit from rfcomm_cleanup_ttys()\n\nrfcomm_cleanup_ttys() is also called from rfcomm_init(), so it can\u0027t\nhave __exit.\n\nReported-by: Mat Martineau \u003cmathewm@codeaurora.org\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "2f8362afcd2da8b313ec3cc04a50af19d3592972",
      "tree": "c4fe061e063d399c73a08e3fef7864fb4fe36a72",
      "parents": [
        "f2b94bb9e0b8bd048331a6e9d616e918f4bcbd97"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Sat Jul 24 02:04:45 2010 -0300"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Tue Jul 27 12:37:27 2010 -0700"
      },
      "message": "Bluetooth: Add __init and __exit marks to RFCOMM\n\nThose annotation save memory and space on the binary. __init code is\ndiscarded just after execute and __exit code is discarded if the module\nis built into the kernel image or unload of modules is not allowed.\n\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "3fa21e07e6acefa31f974d57fba2b6920a7ebd1a",
      "tree": "4254644ef2579e9ac96db6ec0535b5e4231fd18e",
      "parents": [
        "b60b6592baa69c43a5a0f55d6300a7feaab15338"
      ],
      "author": {
        "name": "Joe Perches",
        "email": "joe@perches.com",
        "time": "Mon May 17 23:08:21 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon May 17 23:23:14 2010 -0700"
      },
      "message": "net: Remove unnecessary returns from void function()s\n\nThis patch removes from net/ (but not any netfilter files)\nall the unnecessary return; statements that precede the\nlast closing brace of void functions.\n\nIt does not remove the returns that are immediately\npreceded by a label as gcc doesn\u0027t like that.\n\nDone via:\n$ grep -rP --include\u003d*.[ch] -l \"return;\\n}\" net/ | \\\n  xargs perl -i -e \u0027local $/ ; while (\u003c\u003e) { s/\\n[ \\t\\n]+return;\\n}/\\n}/g; print; }\u0027\n\nSigned-off-by: Joe Perches \u003cjoe@perches.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "aa395145165cb06a0d0885221bbe0ce4a564391d",
      "tree": "118b0403621f10db8dc3dbf12079f9af5b19e05d",
      "parents": [
        "ab9304717f7624c41927f442e6b6d418b2d8b3e4"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Tue Apr 20 13:03:51 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 20 16:37:13 2010 -0700"
      },
      "message": "net: sk_sleep() helper\n\nDefine a new function to return the waitqueue of a \"struct sock\".\n\nstatic inline wait_queue_head_t *sk_sleep(struct sock *sk)\n{\n\treturn sk-\u003esk_sleep;\n}\n\nChange all read occurrences of sk_sleep by a call to this function.\n\nNeeded for a future RCU conversion. sk_sleep wont be a field directly\navailable.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cb4361c1dc29cd870f664c004b1817106fbce0fa",
      "tree": "c31533210d738c9074b21b8f31fe0399b39545f0",
      "parents": [
        "309361e09ca9e9670dc8664e5d14125bf82078af",
        "fb9e2d887243499b8d28efcf80821c4f6a092395"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 06 08:34:06 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 06 08:34:06 2010 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (37 commits)\n  smc91c92_cs: fix the problem of \"Unable to find hardware address\"\n  r8169: clean up my printk uglyness\n  net: Hook up cxgb4 to Kconfig and Makefile\n  cxgb4: Add main driver file and driver Makefile\n  cxgb4: Add remaining driver headers and L2T management\n  cxgb4: Add packet queues and packet DMA code\n  cxgb4: Add HW and FW support code\n  cxgb4: Add register, message, and FW definitions\n  netlabel: Fix several rcu_dereference() calls used without RCU read locks\n  bonding: fix potential deadlock in bond_uninit()\n  net: check the length of the socket address passed to connect(2)\n  stmmac: add documentation for the driver.\n  stmmac: fix kconfig for crc32 build error\n  be2net: fix bug in vlan rx path for big endian architecture\n  be2net: fix flashing on big endian architectures\n  be2net: fix a bug in flashing the redboot section\n  bonding: bond_xmit_roundrobin() fix\n  drivers/net: Add missing unlock\n  net: gianfar - align BD ring size console messages\n  net: gianfar - initialize per-queue statistics\n  ...\n"
    },
    {
      "commit": "6503d96168f891ffa3b70ae6c9698a1a722025a0",
      "tree": "9fafcd9eb2c0b3feda0cf4c36e4167ba3028d83a",
      "parents": [
        "a1d6f3f65512cc90a636e6ec653b7bc9e2238753"
      ],
      "author": {
        "name": "Changli Gao",
        "email": "xiaosuo@gmail.com",
        "time": "Wed Mar 31 22:58:26 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 01 17:26:01 2010 -0700"
      },
      "message": "net: check the length of the socket address passed to connect(2)\n\ncheck the length of the socket address passed to connect(2).\n\nCheck the length of the socket address passed to connect(2). If the\nlength is invalid, -EINVAL will be returned.\n\nSigned-off-by: Changli Gao \u003cxiaosuo@gmail.com\u003e\n----\nnet/bluetooth/l2cap.c | 3 ++-\nnet/bluetooth/rfcomm/sock.c | 3 ++-\nnet/bluetooth/sco.c | 3 ++-\nnet/can/bcm.c | 3 +++\nnet/ieee802154/af_ieee802154.c | 3 +++\nnet/ipv4/af_inet.c | 5 +++++\nnet/netlink/af_netlink.c | 3 +++\n7 files changed, 20 insertions(+), 3 deletions(-)\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5a0e3ad6af8660be21ca98a971cd00f331318c05",
      "tree": "5bfb7be11a03176a87296a43ac6647975c00a1d1",
      "parents": [
        "ed391f4ebf8f701d3566423ce8f17e614cde9806"
      ],
      "author": {
        "name": "Tejun Heo",
        "email": "tj@kernel.org",
        "time": "Wed Mar 24 17:04:11 2010 +0900"
      },
      "committer": {
        "name": "Tejun Heo",
        "email": "tj@kernel.org",
        "time": "Tue Mar 30 22:02:32 2010 +0900"
      },
      "message": "include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h\n\npercpu.h is included by sched.h and module.h and thus ends up being\nincluded when building most .c files.  percpu.h includes slab.h which\nin turn includes gfp.h making everything defined by the two files\nuniversally available and complicating inclusion dependencies.\n\npercpu.h -\u003e slab.h dependency is about to be removed.  Prepare for\nthis change by updating users of gfp and slab facilities include those\nheaders directly instead of assuming availability.  As this conversion\nneeds to touch large number of source files, the following script is\nused as the basis of conversion.\n\n  http://userweb.kernel.org/~tj/misc/slabh-sweep.py\n\nThe script does the followings.\n\n* Scan files for gfp and slab usages and update includes such that\n  only the necessary includes are there.  ie. if only gfp is used,\n  gfp.h, if slab is used, slab.h.\n\n* When the script inserts a new include, it looks at the include\n  blocks and try to put the new include such that its order conforms\n  to its surrounding.  It\u0027s put in the include block which contains\n  core kernel includes, in the same order that the rest are ordered -\n  alphabetical, Christmas tree, rev-Xmas-tree or at the end if there\n  doesn\u0027t seem to be any matching order.\n\n* If the script can\u0027t find a place to put a new include (mostly\n  because the file doesn\u0027t have fitting include block), it prints out\n  an error message indicating which .h file needs to be added to the\n  file.\n\nThe conversion was done in the following steps.\n\n1. The initial automatic conversion of all .c files updated slightly\n   over 4000 files, deleting around 700 includes and adding ~480 gfp.h\n   and ~3000 slab.h inclusions.  The script emitted errors for ~400\n   files.\n\n2. Each error was manually checked.  Some didn\u0027t need the inclusion,\n   some needed manual addition while adding it to implementation .h or\n   embedding .c file was more appropriate for others.  This step added\n   inclusions to around 150 files.\n\n3. The script was run again and the output was compared to the edits\n   from #2 to make sure no file was left behind.\n\n4. Several build tests were done and a couple of problems were fixed.\n   e.g. lib/decompress_*.c used malloc/free() wrappers around slab\n   APIs requiring slab.h to be added manually.\n\n5. The script was run on all .h files but without automatically\n   editing them as sprinkling gfp.h and slab.h inclusions around .h\n   files could easily lead to inclusion dependency hell.  Most gfp.h\n   inclusion directives were ignored as stuff from gfp.h was usually\n   wildly available and often used in preprocessor macros.  Each\n   slab.h inclusion directive was examined and added manually as\n   necessary.\n\n6. percpu.h was updated not to include slab.h.\n\n7. Build test were done on the following configurations and failures\n   were fixed.  CONFIG_GCOV_KERNEL was turned off for all tests (as my\n   distributed build env didn\u0027t work with gcov compiles) and a few\n   more options had to be turned off depending on archs to make things\n   build (like ipr on powerpc/64 which failed due to missing writeq).\n\n   * x86 and x86_64 UP and SMP allmodconfig and a custom test config.\n   * powerpc and powerpc64 SMP allmodconfig\n   * sparc and sparc64 SMP allmodconfig\n   * ia64 SMP allmodconfig\n   * s390 SMP allmodconfig\n   * alpha SMP allmodconfig\n   * um on x86_64 SMP allmodconfig\n\n8. percpu.h modifications were reverted so that it could be applied as\n   a separate patch and serve as bisection point.\n\nGiven the fact that I had only a couple of failures from tests on step\n6, I\u0027m fairly confident about the coverage of this conversion patch.\nIf there is a breakage, it\u0027s likely to be something in one of the arch\nheaders which should be easily discoverable easily on most builds of\nthe specific arch.\n\nSigned-off-by: Tejun Heo \u003ctj@kernel.org\u003e\nGuess-its-ok-by: Christoph Lameter \u003ccl@linux-foundation.org\u003e\nCc: Ingo Molnar \u003cmingo@redhat.com\u003e\nCc: Lee Schermerhorn \u003cLee.Schermerhorn@hp.com\u003e\n"
    },
    {
      "commit": "aef7d97cc604309b66f6f45cce02cd734934cd4e",
      "tree": "b21aae56f9a5de0bbabe881d597a4dc790ff97c8",
      "parents": [
        "101545f6fef4a0a3ea8daf0b5b880df2c6a92a69"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sun Mar 21 05:27:45 2010 +0100"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sun Mar 21 05:49:35 2010 +0100"
      },
      "message": "Bluetooth: Convert debug files to actually use debugfs instead of sysfs\n\nSome of the debug files ended up wrongly in sysfs, because at that point\nof time, debugfs didn\u0027t exist. Convert these files to use debugfs and\nalso seq_file. This patch converts all of these files at once and then\nremoves the exported symbol for the Bluetooth sysfs class.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "101545f6fef4a0a3ea8daf0b5b880df2c6a92a69",
      "tree": "5b4254a64db65f1958a36ec6955dbba1b71031a7",
      "parents": [
        "af98441397227a5a4f212cd48710eea72a14dbdb"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Mon Mar 15 14:12:58 2010 -0700"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sun Mar 21 05:49:32 2010 +0100"
      },
      "message": "Bluetooth: Fix potential bad memory access with sysfs files\n\nWhen creating a high number of Bluetooth sockets (L2CAP, SCO\nand RFCOMM) it is possible to scribble repeatedly on arbitrary\npages of memory. Ensure that the content of these sysfs files is\nalways less than one page. Even if this means truncating. The\nfiles in question are scheduled to be moved over to debugfs in\nthe future anyway.\n\nBased on initial patches from Neil Brown and Linus Torvalds\n\nReported-by: Neil Brown \u003cneilb@suse.de\u003e\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "28812fe11a21826ba4c97c6c7971a619987cd912",
      "tree": "c78daefd595989bbc660ea48d8bc2dc5750321d3",
      "parents": [
        "5fbcae57db69128c14080a7a5a42d0626bfe155c"
      ],
      "author": {
        "name": "Andi Kleen",
        "email": "andi@firstfloor.org",
        "time": "Tue Jan 05 12:48:07 2010 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@suse.de",
        "time": "Sun Mar 07 17:04:48 2010 -0800"
      },
      "message": "driver-core: Add attribute argument to class_attribute show/store\n\nPassing the attribute to the low level IO functions allows all kinds\nof cleanups, by sharing low level IO code without requiring\nan own function for every piece of data.\n\nAlso drivers can extend the attributes with own data fields\nand use that in the low level function.\n\nThis makes the class attributes the same as sysdev_class attributes\nand plain attributes.\n\nThis will allow further cleanups in drivers.\n\nFull tree sweep converting all users.\n\nSigned-off-by: Andi Kleen \u003cak@linux.intel.com\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@suse.de\u003e\n\n"
    },
    {
      "commit": "6c2718da59613d76013b501bf0f8bcf9d7794b2d",
      "tree": "9872ff9b1cb630130f0da9c6abca771d52fb1fa8",
      "parents": [
        "485f1eff73a7b932fd3abb0dfcf804e1a1f59025"
      ],
      "author": {
        "name": "Nick Pelly",
        "email": "npelly@google.com",
        "time": "Wed Feb 03 16:18:36 2010 -0800"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Wed Feb 03 16:28:44 2010 -0800"
      },
      "message": "Bluetooth: Do not call rfcomm_session_put() for RFCOMM UA on closed socket\n\nWhen processing a RFCOMM UA frame when the socket is closed and we were\nnot the RFCOMM initiator would cause rfcomm_session_put() to be called\ntwice during rfcomm_process_rx(). This would cause a kernel panic in\nrfcomm_session_close() then.\n\nThis could be easily reproduced during disconnect with devices such as\nMotorola H270 that send RFCOMM UA followed quickly by L2CAP disconnect\nrequest. This trace for this looks like:\n\n2009-09-21 17:22:37.788895 \u003c ACL data: handle 1 flags 0x02 dlen 8\n   L2CAP(d): cid 0x0041 len 4 [psm 3]\n     RFCOMM(s): DISC: cr 0 dlci 20 pf 1 ilen 0 fcs 0x7d\n2009-09-21 17:22:37.906204 \u003e HCI Event: Number of Completed Packets (0x13) plen 5\n   handle 1 packets 1\n2009-09-21 17:22:37.933090 \u003e ACL data: handle 1 flags 0x02 dlen 8\n   L2CAP(d): cid 0x0040 len 4 [psm 3]\n     RFCOMM(s): UA: cr 0 dlci 20 pf 1 ilen 0 fcs 0x57\n2009-09-21 17:22:38.636764 \u003c ACL data: handle 1 flags 0x02 dlen 8\n   L2CAP(d): cid 0x0041 len 4 [psm 3]\n     RFCOMM(s): DISC: cr 0 dlci 0 pf 1 ilen 0 fcs 0x9c\n2009-09-21 17:22:38.744125 \u003e HCI Event: Number of Completed Packets (0x13) plen 5\n   handle 1 packets 1\n2009-09-21 17:22:38.763687 \u003e ACL data: handle 1 flags 0x02 dlen 8\n   L2CAP(d): cid 0x0040 len 4 [psm 3]\n     RFCOMM(s): UA: cr 0 dlci 0 pf 1 ilen 0 fcs 0xb6\n2009-09-21 17:22:38.783554 \u003e ACL data: handle 1 flags 0x02 dlen 12\n   L2CAP(s): Disconn req: dcid 0x0040 scid 0x0041\n\nAvoid calling rfcomm_session_put() twice by skipping this call\nin rfcomm_recv_ua() if the socket is closed.\n\nSigned-off-by: Nick Pelly \u003cnpelly@google.com\u003e\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "485f1eff73a7b932fd3abb0dfcf804e1a1f59025",
      "tree": "9219b988d9662957ba9382761cca6d08a3273abd",
      "parents": [
        "1038a00b458997661bcd0e780a24dc280a8841fc"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Wed Feb 03 15:52:18 2010 -0800"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Wed Feb 03 15:52:18 2010 -0800"
      },
      "message": "Bluetooth: Fix sleeping function in RFCOMM within invalid context\n\nWith the commit 9e726b17422bade75fba94e625cd35fd1353e682 the\nrfcomm_session_put() gets accidentially called from a timeout\ncallback and results in this:\n\nBUG: sleeping function called from invalid context at net/core/sock.c:1897\nin_atomic(): 1, irqs_disabled(): 0, pid: 0, name: swapper\nPid: 0, comm: swapper Tainted: P           2.6.32 #31\nCall Trace:\n \u003cIRQ\u003e  [\u003cffffffff81036455\u003e] __might_sleep+0xf8/0xfa\n [\u003cffffffff8138ef1d\u003e] lock_sock_nested+0x29/0xc4\n [\u003cffffffffa03921b3\u003e] lock_sock+0xb/0xd [l2cap]\n [\u003cffffffffa03948e6\u003e] l2cap_sock_shutdown+0x1c/0x76 [l2cap]\n [\u003cffffffff8106adea\u003e] ? clockevents_program_event+0x75/0x7e\n [\u003cffffffff8106bea2\u003e] ? tick_dev_program_event+0x37/0xa5\n [\u003cffffffffa0394967\u003e] l2cap_sock_release+0x27/0x67 [l2cap]\n [\u003cffffffff8138c971\u003e] sock_release+0x1a/0x67\n [\u003cffffffffa03d2492\u003e] rfcomm_session_del+0x34/0x53 [rfcomm]\n [\u003cffffffffa03d24c5\u003e] rfcomm_session_put+0x14/0x16 [rfcomm]\n [\u003cffffffffa03d28b4\u003e] rfcomm_session_timeout+0xe/0x1a [rfcomm]\n [\u003cffffffff810554a8\u003e] run_timer_softirq+0x1e2/0x29a\n [\u003cffffffffa03d28a6\u003e] ? rfcomm_session_timeout+0x0/0x1a [rfcomm]\n [\u003cffffffff8104e0f6\u003e] __do_softirq+0xfe/0x1c5\n [\u003cffffffff8100e8ce\u003e] ? timer_interrupt+0x1a/0x21\n [\u003cffffffff8100cc4c\u003e] call_softirq+0x1c/0x28\n [\u003cffffffff8100e05b\u003e] do_softirq+0x33/0x6b\n [\u003cffffffff8104daf6\u003e] irq_exit+0x36/0x85\n [\u003cffffffff8100d7a9\u003e] do_IRQ+0xa6/0xbd\n [\u003cffffffff8100c493\u003e] ret_from_intr+0x0/0xa\n \u003cEOI\u003e  [\u003cffffffff812585b3\u003e] ? acpi_idle_enter_bm+0x269/0x294\n [\u003cffffffff812585a9\u003e] ? acpi_idle_enter_bm+0x25f/0x294\n [\u003cffffffff81373ddc\u003e] ? cpuidle_idle_call+0x97/0x107\n [\u003cffffffff8100aca0\u003e] ? cpu_idle+0x53/0xaa\n [\u003cffffffff81429006\u003e] ? rest_init+0x7a/0x7c\n [\u003cffffffff8177bc8c\u003e] ? start_kernel+0x389/0x394\n [\u003cffffffff8177b29c\u003e] ? x86_64_start_reservations+0xac/0xb0\n [\u003cffffffff8177b384\u003e] ? x86_64_start_kernel+0xe4/0xeb\n\nTo fix this, the rfcomm_session_put() needs to be moved out of\nrfcomm_session_timeout() into rfcomm_process_sessions(). In that\ncontext it is perfectly fine to sleep and disconnect the socket.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nTested-by: David John \u003cdavidjon@xenontk.org\u003e\n"
    },
    {
      "commit": "eae38eede2e5f70d65f09327297bd698b0d3ea7e",
      "tree": "695cfeaaa240d4ad9c91b7fb40edfbe8c343534c",
      "parents": [
        "5fbcd3d1a07e234583e17830e8aef47282c22141"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Mon Oct 05 12:23:48 2009 +0200"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Thu Dec 03 19:34:26 2009 +0100"
      },
      "message": "Bluetooth: Add RFCOMM option to use L2CAP ERTM mode\n\nBy default the RFCOMM layer would still use L2CAP basic mode. For testing\npurposes this option enables RFCOMM to select enhanced retransmission\nmode.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "3f378b684453f2a028eda463ce383370545d9cc9",
      "tree": "dc50d087e137c6d173e25ae10ecd0f10823eca7a",
      "parents": [
        "13f18aa05f5abe135f47b6417537ae2b2fedc18c"
      ],
      "author": {
        "name": "Eric Paris",
        "email": "eparis@redhat.com",
        "time": "Thu Nov 05 22:18:14 2009 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 05 22:18:14 2009 -0800"
      },
      "message": "net: pass kern to net_proto_family create function\n\nThe generic __sock_create function has a kern argument which allows the\nsecurity system to make decisions based on if a socket is being created by\nthe kernel or by userspace.  This patch passes that flag to the\nnet_proto_family specific create function, so it can do the same thing.\n\nSigned-off-by: Eric Paris \u003ceparis@redhat.com\u003e\nAcked-by: Arnaldo Carvalho de Melo \u003cacme@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3b885787ea4112eaa80945999ea0901bf742707f",
      "tree": "06fc15f8e8083d5652ccb4d06653d9812dce9c0b",
      "parents": [
        "d5e63bded6e819ca77ee1a1d97c783a31f6caf30"
      ],
      "author": {
        "name": "Neil Horman",
        "email": "nhorman@tuxdriver.com",
        "time": "Mon Oct 12 13:26:31 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 12 13:26:31 2009 -0700"
      },
      "message": "net: Generalize socket rx gap / receive queue overflow cmsg\n\nCreate a new socket level option to report number of queue overflows\n\nRecently I augmented the AF_PACKET protocol to report the number of frames lost\non the socket receive queue between any two enqueued frames.  This value was\nexported via a SOL_PACKET level cmsg.  AFter I completed that work it was\nrequested that this feature be generalized so that any datagram oriented socket\ncould make use of this option.  As such I\u0027ve created this patch, It creates a\nnew SOL_SOCKET level option called SO_RXQ_OVFL, which when enabled exports a\nSOL_SOCKET level cmsg that reports the nubmer of times the sk_receive_queue\noverflowed between any two given frames.  It also augments the AF_PACKET\nprotocol to take advantage of this new feature (as it previously did not touch\nsk-\u003esk_drops, which this patch uses to record the overflow count).  Tested\nsuccessfully by me.\n\nNotes:\n\n1) Unlike my previous patch, this patch simply records the sk_drops value, which\nis not a number of drops between packets, but rather a total number of drops.\nDeltas must be computed in user space.\n\n2) While this patch currently works with datagram oriented protocols, it will\nalso be accepted by non-datagram oriented protocols. I\u0027m not sure if thats\nagreeable to everyone, but my argument in favor of doing so is that, for those\nprotocols which aren\u0027t applicable to this option, sk_drops will always be zero,\nand reporting no drops on a receive queue that isn\u0027t used for those\nnon-participating protocols seems reasonable to me.  This also saves us having\nto code in a per-protocol opt in mechanism.\n\n3) This applies cleanly to net-next assuming that commit\n977750076d98c7ff6cbda51858bb5a5894a9d9ab (my af packet cmsg patch) is reverted\n\nSigned-off-by: Neil Horman \u003cnhorman@tuxdriver.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ec1b4cf74c81bfd0fbe5bf62bafc86c45917e72f",
      "tree": "1b693e4e027f3e42224e6221ae018daeb562e5e1",
      "parents": [
        "f7734fdf61ec6bb848e0bafc1fb8bad2c124bb50"
      ],
      "author": {
        "name": "Stephen Hemminger",
        "email": "shemminger@vyatta.com",
        "time": "Mon Oct 05 05:58:39 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 07 01:10:46 2009 -0700"
      },
      "message": "net: mark net_proto_ops as const\n\nAll usages of structure net_proto_ops should be declared const.\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b7058842c940ad2c08dd829b21e5c92ebe3b8758",
      "tree": "5fe78d599fc345ca0bcd4b083b79095a54b2921b",
      "parents": [
        "eb1cf0f8f7a9e5a6d573d5bd72c015686a042db0"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Sep 30 16:12:20 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Sep 30 16:12:20 2009 -0700"
      },
      "message": "net: Make setsockopt() optlen be unsigned.\n\nThis provides safety against negative optlen at the type\nlevel instead of depending upon (sometimes non-trivial)\nchecks against this sprinkled all over the the place, in\neach and every implementation.\n\nBased upon work done by Arjan van de Ven and feedback\nfrom Linus Torvalds.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9e726b17422bade75fba94e625cd35fd1353e682",
      "tree": "af8cf616d9cbda12f51682dbb96e696f135be436",
      "parents": [
        "ef54fd937fbd5ebaeb023818524565bd526a5f36"
      ],
      "author": {
        "name": "Luiz Augusto von Dentz",
        "email": "luiz.dentz@openbossa.org",
        "time": "Wed Jul 15 13:50:58 2009 -0300"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sat Aug 22 15:05:58 2009 -0700"
      },
      "message": "Bluetooth: Fix rejected connection not disconnecting ACL link\n\nWhen using DEFER_SETUP on a RFCOMM socket, a SABM frame triggers\nauthorization which when rejected send a DM response. This is fine\naccording to the RFCOMM spec:\n\n    the responding implementation may replace the \"proper\" response\n    on the Multiplexer Control channel with a DM frame, sent on the\n    referenced DLCI to indicate that the DLCI is not open, and that\n    the responder would not grant a request to open it later either.\n\nBut some stacks doesn\u0027t seems to cope with this leaving DLCI 0 open after\nreceiving DM frame.\n\nTo fix it properly a timer was introduced to rfcomm_session which is used\nto set a timeout when the last active DLC of a session is unlinked, this\nwill give the remote stack some time to reply with a proper DISC frame on\nDLCI 0 avoiding both sides sending DISC to each other on stacks that\nfollow the specification and taking care of those who don\u0027t by taking\ndown DLCI 0.\n\nSigned-off-by: Luiz Augusto von Dentz \u003cluiz.dentz@openbossa.org\u003e\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "52d18347dfb61519aa0f58fe1759edd3ad8c4e36",
      "tree": "e704210e27846a7763853d3a15236809c00e3ef4",
      "parents": [
        "a6a67efd7088702fdbbb780c5a3f8e1a74e77b63"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sat Aug 22 14:49:36 2009 -0700"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sat Aug 22 14:49:36 2009 -0700"
      },
      "message": "Bluetooth: Coding style cleanup from previous rfcomm_init bug fix\n\nThe rfcomm_init bug fix went into the kernel premature before it got fully\nreviewed and acknowledged by the Bluetooth maintainer. So fix up the coding\nstyle now.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "af0d3b103bcfa877343ee338de12002cd50c9ee5",
      "tree": "a06b348fae8d295b17e7620d00df6701f678d449",
      "parents": [
        "eb4ad826419ab5b1260bc1625249114767d36bea"
      ],
      "author": {
        "name": "Dave Young",
        "email": "hidave.darkstar@gmail.com",
        "time": "Mon Aug 03 04:26:16 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Aug 03 13:24:39 2009 -0700"
      },
      "message": "bluetooth: rfcomm_init bug fix\n\nrfcomm tty may be used before rfcomm_tty_driver initilized,\nThe problem is that now socket layer init before tty layer, if userspace\nprogram do socket callback right here then oops will happen.\n\nreporting in:\nhttp://marc.info/?l\u003dlinux-bluetooth\u0026m\u003d124404919324542\u0026w\u003d2\n\nmake 3 changes:\n1. remove #ifdef in rfcomm/core.c,\nmake it blank function when rfcomm tty not selected in rfcomm.h\n\n2. tune the rfcomm_init error patch to ensure\ntty driver initilized before rfcomm socket usage.\n\n3. remove __exit for rfcomm_cleanup_sockets\nbecause above change need call it in a __init function.\n\nReported-by: Oliver Hartkopp \u003coliver@hartkopp.net\u003e\nTested-by: Oliver Hartkopp \u003coliver@hartkopp.net\u003e\nSigned-off-by: Dave Young \u003chidave.darkstar@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b4324b5dc5b62ba76372e1bf8927230cf744df66",
      "tree": "0827bb177760bd2bdac41fbf6466eb1c825b9d88",
      "parents": [
        "47ec1dcd696d56a7c396e5838516a566ecd4b03d"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sun Jun 07 18:06:51 2009 +0200"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Mon Jun 08 14:50:01 2009 +0200"
      },
      "message": "Bluetooth: Remove pointless endian conversion helpers\n\nThe Bluetooth source uses some endian conversion helpers, that in the end\ntranslate to kernel standard routines. So remove this obfuscation since it\nis fully pointless.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "e2139b32726e5dd184974c785ea3f62026590801",
      "tree": "663f35194914f7aa2dbb30fb65ed3f4b13ed8da9",
      "parents": [
        "a0a69a0106dab8d20596f97f6674bed3b394d1ee"
      ],
      "author": {
        "name": "Johan Hedberg",
        "email": "johan.hedberg@nokia.com",
        "time": "Thu Mar 26 16:41:56 2009 +0200"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sun Apr 19 18:56:45 2009 +0200"
      },
      "message": "Bluetooth: Fix removing of RFCOMM DLC timer with DEFER_SETUP\n\nThere is a missing call to rfcomm_dlc_clear_timer in the case that\nDEFER_SETUP is used and so the connection gets disconnected after the\ntimeout even if it was successfully accepted previously.\n\nThis patch adds a call to rfcomm_dlc_clear_timer to rfcomm_dlc_accept\nwhich will get called when the user accepts the connection by calling\nread() on the socket.\n\nSigned-off-by: Johan Hedberg \u003cjohan.hedberg@nokia.com\u003e\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "0f043a81ebe84be3576667f04fdda481609e3816",
      "tree": "c54a9ac4a1dc79bd5f2f7ec3ead5aa48802ff7a3",
      "parents": [
        "140716934f67a9b28c3f7032c07c20c746d97a31"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Tue Mar 31 15:19:25 2009 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Apr 01 08:59:10 2009 -0700"
      },
      "message": "proc tty: remove struct tty_operations::read_proc\n\nstruct tty_operations::proc_fops took it\u0027s place and there is one less\ncreate_proc_read_entry() user now!\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nCc: Alan Cox \u003calan@lxorguk.ukuu.org.uk\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "08abe18af1f78ee80c3c3a5ac47c3e0ae0beadf6",
      "tree": "2be39bf8942edca1bcec735145e144a682ca9cd3",
      "parents": [
        "f0de70f8bb56952f6e016a65a8a8d006918f5bf6",
        "0384e2959127a56d0640505d004d8dd92f9c29f5"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 26 15:23:24 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 26 15:23:24 2009 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of /home/davem/src/GIT/linux-2.6/\n\nConflicts:\n\tdrivers/net/wimax/i2400m/usb-notif.c\n"
    },
    {
      "commit": "ffa6a7054d172a2f57248dff2de600ca795c5656",
      "tree": "f93c6234bb90295c52fcef09e367ed77ff6c3645",
      "parents": [
        "60530afe1ee8a5532cb09d0ab5bc3f1a6495b780"
      ],
      "author": {
        "name": "Cornelia Huck",
        "email": "cornelia.huck@de.ibm.com",
        "time": "Wed Mar 04 12:44:00 2009 +0100"
      },
      "committer": {
        "name": "Greg Kroah-Hartman",
        "email": "gregkh@suse.de",
        "time": "Tue Mar 24 16:38:26 2009 -0700"
      },
      "message": "Driver core: Fix device_move() vs. dpm list ordering, v2\n\ndpm_list currently relies on the fact that child devices will\nbe registered after their parents to get a correct suspend\norder. Using device_move() however destroys this assumption, as\nan already registered device may be moved under a newly registered\none.\n\nThis patch adds a new argument to device_move(), allowing callers\nto specify how dpm_list should be adapted.\n\nSigned-off-by: Cornelia Huck \u003ccornelia.huck@de.ibm.com\u003e\nAcked-by: Alan Stern \u003cstern@rowland.harvard.edu\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@suse.de\u003e\n\n"
    },
    {
      "commit": "37e62f5516cfb210e64fe53457932df4341b0ad1",
      "tree": "7bf4d14be4acbc9f9198d5dedb5ed5fb9badb729",
      "parents": [
        "2a517ca687232adc8f14893730644da712010ffc"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Tue Feb 17 21:49:33 2009 +0100"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Fri Feb 27 06:14:48 2009 +0100"
      },
      "message": "Bluetooth: Fix RFCOMM usage of in-kernel L2CAP sockets\n\nThe CID value of L2CAP sockets need to be set to zero. All userspace\napplications do this via memset() on the sockaddr_l2 structure. The\nRFCOMM implementation uses in-kernel L2CAP sockets and so it has to\nmake sure that l2_cid is set to zero.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "8bf4794174659b06d43cc5e290cd384757374613",
      "tree": "d728d18b4725e1b4f4b421703e020af16772008c",
      "parents": [
        "d5f2d2be68876f65dd051b978a7b66265fde9ffd"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Mon Feb 16 02:59:49 2009 +0100"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Fri Feb 27 06:14:47 2009 +0100"
      },
      "message": "Bluetooth: Change RFCOMM to use BT_CONNECT2 for BT_DEFER_SETUP\n\nWhen BT_DEFER_SETUP is enabled on a RFCOMM socket, then switch its\ncurrent state from BT_OPEN to BT_CONNECT2. This gives the Bluetooth\ncore a unified way to handle L2CAP and RFCOMM sockets. The BT_CONNECT2\nstate is designated for incoming connections.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "0684e5f9fb9e3f7e168ab831dfca693bcb44805b",
      "tree": "1fb1315dff64ef2ebaa24729988b2c3b7c77d578",
      "parents": [
        "efc7688b557dd1be10eead7399b315efcb1dbc74"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Mon Feb 09 02:48:38 2009 +0100"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Fri Feb 27 06:14:40 2009 +0100"
      },
      "message": "Bluetooth: Use general bonding whenever possible\n\nWhen receiving incoming connection to specific services, always use\ngeneral bonding. This ensures that the link key gets stored and can be\nused for further authentications.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "6e1031a40029492c10509e8c3dcac9b611438ccb",
      "tree": "534b3b4c4b1495ae0f948453bf54e0d71e1216f5",
      "parents": [
        "34a55eda483e8177c9044f93fd2c9107f02bf1c7"
      ],
      "author": {
        "name": "Jaikumar Ganesh",
        "email": "jaikumar@google.com",
        "time": "Mon Feb 02 18:03:57 2009 -0800"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Fri Feb 27 06:14:35 2009 +0100"
      },
      "message": "Bluetooth: When encryption is dropped, do not send RFCOMM packets\n\nDuring a role change with pre-Bluetooth 2.1 devices, the remote side drops\nthe encryption of the RFCOMM connection. We allow a grace period for the\nencryption to be re-established, before dropping the connection. During\nthis grace period, the RFCOMM_SEC_PENDING flag is set. Check this flag\nbefore sending RFCOMM packets.\n\nSigned-off-by: Jaikumar Ganesh \u003cjaikumar@google.com\u003e\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "5f9018af004fa8635bbbe3ab2dc61e8a686edfaa",
      "tree": "7d31fb740d7ddff8835c7ece90780a47ae1559cc",
      "parents": [
        "0588d94fd7e414367a7ae517569d2222441c255f"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Fri Jan 16 10:09:50 2009 +0100"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Fri Feb 27 06:14:34 2009 +0100"
      },
      "message": "Bluetooth: Update version numbers\n\nWith the support for the enhanced security model and the support for\ndeferring connection setup, it is a good idea to increase various\nversion numbers.\n\nThis is purely cosmetic and has no effect on the behavior, but can\nbe really helpful when debugging problems in different kernel versions.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "0588d94fd7e414367a7ae517569d2222441c255f",
      "tree": "c8563ce159bbea94e57df39a9b27bb1628ebccdd",
      "parents": [
        "f62e4323ab43c59e7cd7f72c1eb392d7c767ce5a"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Fri Jan 16 10:06:13 2009 +0100"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Fri Feb 27 06:14:33 2009 +0100"
      },
      "message": "Bluetooth: Restrict application of socket options\n\nThe new socket options should only be evaluated for SOL_BLUETOOTH level\nand not for every other level. Previously this causes some minor issues\nwhen detecting if a kernel with certain features is available.\n\nAlso restrict BT_SECURITY to SOCK_SEQPACKET for L2CAP and SOCK_STREAM for\nthe RFCOMM protocol.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "8c84b83076b5062f59b6167cdda90d9e5124aa71",
      "tree": "7a47b0b80be4222494b272846ad5233f0d04c6e6",
      "parents": [
        "9f2c8a03fbb3048cf38b158f87aa0c3c09bca084"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Fri Jan 16 08:17:51 2009 +0100"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Fri Feb 27 06:14:33 2009 +0100"
      },
      "message": "Bluetooth: Pause RFCOMM TX when encryption drops\n\nA role switch with devices following the Bluetooth pre-2.1 standards\nor without Encryption Pause and Resume support is not possible if\nencryption is enabled. Most newer headsets require the role switch,\nbut also require that the connection is encrypted.\n\nFor connections with a high security mode setting, the link will be\nimmediately dropped. When the connection uses medium security mode\nsetting, then a grace period is introduced where the TX is halted and\nthe remote device gets a change to re-enable encryption after the\nrole switch. If not re-enabled the link will be dropped.\n\nBased on initial work by Ville Tervo \u003cville.tervo@nokia.com\u003e\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "9f2c8a03fbb3048cf38b158f87aa0c3c09bca084",
      "tree": "b8e81e5a8e3f0b8b8a15c06f1cf36e8aa02644e2",
      "parents": [
        "2af6b9d518ddfbc4d6990d5f9c9b1a05341c1cef"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Thu Jan 15 21:58:40 2009 +0100"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Fri Feb 27 06:14:26 2009 +0100"
      },
      "message": "Bluetooth: Replace RFCOMM link mode with security level\n\nChange the RFCOMM internals to use the new security levels and remove\nthe link mode details.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "8c1b235594fbab9a13240a1dac12ea9fd99b6440",
      "tree": "eb137a23e0fd8199144a4c3e36902af411e44269",
      "parents": [
        "c89b6e6bda4c8021195778f47567d0cc9dbfe7ec"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Thu Jan 15 21:58:04 2009 +0100"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Fri Feb 27 06:14:25 2009 +0100"
      },
      "message": "Bluetooth: Add enhanced security model for Simple Pairing\n\nThe current security model is based around the flags AUTH, ENCRYPT and\nSECURE. Starting with support for the Bluetooth 2.1 specification this is\nno longer sufficient. The different security levels are now defined as\nSDP, LOW, MEDIUM and SECURE.\n\nPreviously it was possible to set each security independently, but this\nactually doesn\u0027t make a lot of sense. For Bluetooth the encryption depends\non a previous successful authentication. Also you can only update your\nexisting link key if you successfully created at least one before. And of\ncourse the update of link keys without having proper encryption in place\nis a security issue.\n\nThe new security levels from the Bluetooth 2.1 specification are now\nused internally. All old settings are mapped to the new values and this\nway it ensures that old applications still work. The only limitation\nis that it is no longer possible to set authentication without also\nenabling encryption. No application should have done this anyway since\nthis is actually a security issue. Without encryption the integrity of\nthe authentication can\u0027t be guaranteed.\n\nAs default for a new L2CAP or RFCOMM connection, the LOW security level\nis used. The only exception here are the service discovery sessions on\nPSM 1 where SDP level is used. To have similar security strength as with\na Bluetooth 2.0 and before combination key, the MEDIUM level should be\nused. This is according to the Bluetooth specification. The MEDIUM level\nwill not require any kind of man-in-the-middle (MITM) protection. Only\nthe HIGH security level will require this.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "bb23c0ab824653be4aa7dfca15b07b3059717004",
      "tree": "bd0390c67d129e8b5ddc2a70a1b12e383db6fa16",
      "parents": [
        "c4f912e155504e94dd4f3d63c378dab0ff03dbda"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Thu Jan 15 21:56:48 2009 +0100"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Fri Feb 27 06:14:23 2009 +0100"
      },
      "message": "Bluetooth: Add support for deferring RFCOMM connection setup\n\nIn order to decide if listening RFCOMM sockets should be accept()ed\nthe BD_ADDR of the remote device needs to be known. This patch adds\na socket option which defines a timeout for deferring the actual\nconnection setup.\n\nThe connection setup is done after reading from the socket for the\nfirst time. Until then writing to the socket returns ENOTCONN.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "d58daf42d29a3a4a4d4be46cf47ceee096789680",
      "tree": "c88a5820a44fe993e271437b0fcebdde7e8298d3",
      "parents": [
        "91aa35a5aa3540223066bf6b51c935418c63a35d"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Thu Jan 15 21:52:14 2009 +0100"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Fri Feb 27 06:14:22 2009 +0100"
      },
      "message": "Bluetooth: Preparation for usage of SOL_BLUETOOTH\n\nThe socket option levels SOL_L2CAP, SOL_RFOMM and SOL_SCO are currently\nin use by various Bluetooth applications. Going forward the common\noption level SOL_BLUETOOTH should be used. This patch prepares the clean\nsplit of the old and new option levels while keeping everything backward\ncompatibility.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    }
  ],
  "next": "91aa35a5aa3540223066bf6b51c935418c63a35d"
}
