)]}'
{
  "log": [
    {
      "commit": "f7a8db89c1f42e504bb12d2ae399cd96f755a7db",
      "tree": "0b98001ee746784e95a0809a8499483ace2450d5",
      "parents": [
        "6f84b4dbe92e3ffb00f4d8cbe9a31b5be5ecd8ca",
        "c49b9f295e513753e6d9bb4444ba502f1aa59b29"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Dec 08 19:52:43 2008 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Dec 08 19:52:43 2008 -0800"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6:\n  tproxy: fixe a possible read from an invalid location in the socket match\n  zd1211rw: use unaligned safe memcmp() in-place of compare_ether_addr()\n  mac80211: use unaligned safe memcmp() in-place of compare_ether_addr()\n  ipw2200: fix netif_*_queue() removal regression\n  iwlwifi: clean key table in iwl_clear_stations_table function\n  tcp: tcp_vegas ssthresh bug fix\n  can: omit received RTR frames for single ID filter lists\n  ATM: CVE-2008-5079: duplicate listen() on socket corrupts the vcc table\n  netx-eth: initialize per device spinlock\n  tcp: make urg+gso work for real this time\n  enc28j60: Fix sporadic packet loss (corrected again)\n  hysdn: fix writing outside the field on 64 bits\n  b1isa: fix b1isa_exit() to really remove registered capi controllers\n  can: Fix CAN_(EFF|RTR)_FLAG handling in can_filter\n  Phonet: do not dump addresses from other namespaces\n  netlabel: Fix a potential NULL pointer dereference\n  bnx2: Add workaround to handle missed MSI.\n  xfrm: Fix kernel panic when flush and dump SPD entries\n"
    },
    {
      "commit": "c49b9f295e513753e6d9bb4444ba502f1aa59b29",
      "tree": "ce46987a31304cf239bd8ee46afbc059cefab5dc",
      "parents": [
        "0a0755c9fe47dc9f8271935909c66096e43efbfe"
      ],
      "author": {
        "name": "Balazs Scheidler",
        "email": "bazsi@balabit.hu",
        "time": "Sun Dec 07 23:53:46 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Dec 07 23:53:46 2008 -0800"
      },
      "message": "tproxy: fixe a possible read from an invalid location in the socket match\n\nTIME_WAIT sockets need to be handled specially, and the socket match\ncasted inet_timewait_sock instances to inet_sock, which are not\ncompatible.\n\nHandle this special case by checking sk-\u003esk_state.\n\nSigned-off-by: Balazs Scheidler \u003cbazsi@balabit.hu\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0a0755c9fe47dc9f8271935909c66096e43efbfe",
      "tree": "dd24b9a654f96742a3600d6735c81950ef16dc39",
      "parents": [
        "a6af2d6ba5797c556fba0cd3a19e5f3bc9a99b76",
        "cde6901b7b69557a6f90f3183f76eda581af015e"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Dec 05 22:09:56 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Dec 05 22:09:56 2008 -0800"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "5cf12e8dc641ef028f0cf9c317a9567e6b794de1",
      "tree": "79ab01689f1b81fd8a5e9a2c80b81387d19257b8",
      "parents": [
        "b8ddafd759e356c839774a8b87011b768deb53b3"
      ],
      "author": {
        "name": "Shaddy Baddah",
        "email": "shaddy_baddah@hotmail.com",
        "time": "Fri Nov 28 17:08:10 2008 +1100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Fri Dec 05 09:18:35 2008 -0500"
      },
      "message": "mac80211: use unaligned safe memcmp() in-place of compare_ether_addr()\n\nAfter fixing zd1211rw: use unaligned safe memcmp() in-place of\ncompare_ether_addr(), I started to see kernel log messages detailing\nunaligned access:\n\n  Kernel unaligned access at TPC[100f7f44] sta_info_get+0x24/0x68 [mac80211]\n\nAs with the aforementioned patch, the unaligned access was eminating\nfrom a compare_ether_addr() call. Concerned that whilst it was safe to\nassume that unalignment was the norm for the zd1211rw, and take\npreventative measures, it may not be the case or acceptable to use the\neasy fix of changing the call to memcmp().\n\nMy research however indicated that it was OK to do this, as there are\na few instances where memcmp() is the preferred mechanism for doing\nmac address comparisons throughout the module.\n\nSigned-off-by: Shaddy Baddah \u003cshaddy_baddah@hotmail.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "a6af2d6ba5797c556fba0cd3a19e5f3bc9a99b76",
      "tree": "dd2a3be62a935df9c8f8d0a0845ddd310d774f6c",
      "parents": [
        "f706644d55f90e8306d87060168fef33804d6dd9"
      ],
      "author": {
        "name": "Doug Leith",
        "email": "doug.leith@nuim.ie",
        "time": "Thu Dec 04 17:17:18 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 04 17:17:18 2008 -0800"
      },
      "message": "tcp: tcp_vegas ssthresh bug fix\n\nThis patch fixes a bug in tcp_vegas.c.  At the moment this code leaves\nssthresh untouched.  However, this means that the vegas congestion\ncontrol algorithm is effectively unable to reduce cwnd below the\nssthresh value (if the vegas update lowers the cwnd below ssthresh,\nthen slow start is activated to raise it back up).  One example where\nthis matters is when during slow start cwnd overshoots the link\ncapacity and a flow then exits slow start with ssthresh set to a value\nabove where congestion avoidance would like to adjust it.\n\nSigned-off-by: Doug Leith \u003cdoug.leith@nuim.ie\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f706644d55f90e8306d87060168fef33804d6dd9",
      "tree": "fb3755398c41cc64c253bcc87ad96169bff67362",
      "parents": [
        "17b24b3c97498935a2ef9777370b1151dfed3f6f"
      ],
      "author": {
        "name": "Oliver Hartkopp",
        "email": "oliver@hartkopp.net",
        "time": "Thu Dec 04 15:01:08 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 04 15:01:08 2008 -0800"
      },
      "message": "can: omit received RTR frames for single ID filter lists\n\nSince commit d253eee20195b25e298bf162a6e72f14bf4803e5 the single CAN\nidentifier filter lists handle only non-RTR CAN frames.\n\nSo we need to omit the check of these filter lists when receiving RTR\nCAN frames.\n\nSigned-off-by: Oliver Hartkopp \u003coliver@hartkopp.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "17b24b3c97498935a2ef9777370b1151dfed3f6f",
      "tree": "5b291b7069494889f375427448a30fde92332fcd",
      "parents": [
        "2cc002c4bbce4d918ab94b494d61c6991c907d5e"
      ],
      "author": {
        "name": "Chas Williams",
        "email": "chas@cmf.nrl.navy.mil",
        "time": "Thu Dec 04 14:58:13 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 04 14:58:13 2008 -0800"
      },
      "message": "ATM: CVE-2008-5079: duplicate listen() on socket corrupts the vcc table\n\nAs reported by Hugo Dias that it is possible to cause a local denial\nof service attack by calling the svc_listen function twice on the same\nsocket and reading /proc/net/atm/*vc\n\nSigned-off-by: Chas Williams \u003cchas@cmf.nrl.navy.mil\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f8269a495a1924f8b023532dd3e77423432db810",
      "tree": "73b5f7b9e059a79b890c53572e0e048a2078577d",
      "parents": [
        "5176da7e5318669220e4d2fa856223054a3efc9f"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Wed Dec 03 21:24:48 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Dec 03 21:24:48 2008 -0800"
      },
      "message": "tcp: make urg+gso work for real this time\n\nI should have noticed this earlier... :-) The previous solution\nto URG+GSO/TSO will cause SACK block tcp_fragment to do zig-zig\npatterns, or even worse, a steep downward slope into packet\ncounting because each skb pcount would be truncated to pcount\nof 2 and then the following fragments of the later portion would\nrestore the window again.\n\nBasically this reverts \"tcp: Do not use TSO/GSO when there is\nurgent data\" (33cf71cee1). It also removes some unnecessary code\nfrom tcp_current_mss that didn\u0027t work as intented either (could\nbe that something was changed down the road, or it might have\nbeen broken since the dawn of time) because it only works once\nurg is already written while this bug shows up starting from\n~64k before the urg point.\n\nThe retransmissions already are split to mss sized chunks, so\nonly new data sending paths need splitting in case they have\na segment otherwise suitable for gso/tso. The actually check\ncan be improved to be more narrow but since this is late -rc\nalready, I\u0027ll postpone thinking the more fine-grained things.\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2433c41789d6aa6797ca747707b7764e88e4fb6d",
      "tree": "a4f1706a1038bb8df671807c9ead0fa6abf9b4ed",
      "parents": [
        "cd92a17eec752f8c948c4b6ab93dc099ce55b8cb",
        "a8d82d9b950213b66b22c9e7c63a058841de2394"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Dec 03 16:40:37 2008 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Dec 03 16:40:37 2008 -0800"
      },
      "message": "Merge branch \u0027for-2.6.28\u0027 of git://linux-nfs.org/~bfields/linux\n\n* \u0027for-2.6.28\u0027 of git://linux-nfs.org/~bfields/linux:\n  NLM: client-side nlm_lookup_host() should avoid matching on srcaddr\n  nfsd: use of unitialized list head on error exit in nfs4recover.c\n  Add a reference to sunrpc in svc_addsock\n  nfsd: clean up grace period on early exit\n"
    },
    {
      "commit": "d253eee20195b25e298bf162a6e72f14bf4803e5",
      "tree": "4fd5fef75d52ecae3f41dbd9ae62436e917e1699",
      "parents": [
        "bd7df219202f44e71e2e975a0fb5f76f946c1aef"
      ],
      "author": {
        "name": "Oliver Hartkopp",
        "email": "oliver@hartkopp.net",
        "time": "Wed Dec 03 15:52:35 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Dec 03 15:52:35 2008 -0800"
      },
      "message": "can: Fix CAN_(EFF|RTR)_FLAG handling in can_filter\n\nDue to a wrong safety check in af_can.c it was not possible to filter\nfor SFF frames with a specific CAN identifier without getting the\nsame selected CAN identifier from a received EFF frame also.\n\nThis fix has a minimum (but user visible) impact on the CAN filter\nAPI and therefore the CAN version is set to a new date.\n\nIndeed the \u0027old\u0027 API is still working as-is. But when now setting\nCAN_(EFF|RTR)_FLAG in can_filter.can_mask you might get less traffic\nthan before - but still the stuff that you expected to get for your\ndefined filter ...\n\nThanks to Kurt Van Dijck for pointing at this issue and for the review.\n\nSigned-off-by: Oliver Hartkopp \u003coliver@hartkopp.net\u003e\nAcked-by: Kurt Van Dijck \u003ckurt.van.dijck@eia.be\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "bd7df219202f44e71e2e975a0fb5f76f946c1aef",
      "tree": "6892264cc93ed3a77195cd94d9a3f7f9c6b66dd5",
      "parents": [
        "d25830e5507f6bc815f5dd7e2eb65f172e878a2b"
      ],
      "author": {
        "name": "remi.denis-courmont@nokia",
        "email": "remi.denis-courmont@nokia",
        "time": "Mon Dec 01 02:37:20 2008 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Dec 03 15:42:09 2008 -0800"
      },
      "message": "Phonet: do not dump addresses from other namespaces\n\nSigned-off-by: Rémi Denis-Courmont \u003cremi.denis-courmont@nokia.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d25830e5507f6bc815f5dd7e2eb65f172e878a2b",
      "tree": "8d85a75f93afaf044a8f52783df70cb2ee8118cf",
      "parents": [
        "efba01803c8570bab11d0d6188a630231d0ddccf"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Wed Dec 03 00:37:04 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Dec 03 00:37:04 2008 -0800"
      },
      "message": "netlabel: Fix a potential NULL pointer dereference\n\nFix a potential NULL pointer dereference seen when trying to remove a\nstatic label configuration with an invalid address/mask combination.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d5654efd3ff1cd0baa935a0c9a5d89862f07d009",
      "tree": "dd93620de07f9a181e0238ee820b81df92c376f4",
      "parents": [
        "f6f7b52e2f6149d2ee365717afff315b05720162"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Wed Dec 03 00:27:18 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Dec 03 00:27:18 2008 -0800"
      },
      "message": "xfrm: Fix kernel panic when flush and dump SPD entries\n\nAfter flush the SPD entries, dump the SPD entries will cause kernel painc.\n\nUsed the following commands to reproduct:\n\n- echo \u0027spdflush;\u0027 | setkey -c\n- echo \u0027spdadd 3ffe:501:ffff:ff01::/64 3ffe:501:ffff:ff04::/64  any -P out ipsec \\\n  ah/tunnel/3ffe:501:ffff:ff00:200:ff:fe00:b0b0-3ffe:501:ffff:ff02:200:ff:fe00:a1a1/require;\\\n  spddump;\u0027 | setkey -c\n- echo \u0027spdflush; spddump;\u0027 | setkey -c\n- echo \u0027spdadd 3ffe:501:ffff:ff01::/64 3ffe:501:ffff:ff04::/64  any -P out ipsec \\\n  ah/tunnel/3ffe:501:ffff:ff00:200:ff:fe00:b0b0-3ffe:501:ffff:ff02:200:ff:fe00:a1a1/require;\\\n  spddump;\u0027 | setkey -c\n\nThis is because when flush the SPD entries, the SPD entry is not remove\nfrom the list.\n\nThis patch fix the problem by remove the SPD entry from the list.\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5f23b734963ec7eaa3ebcd9050da0c9b7d143dd3",
      "tree": "f82c2265540dd5d32d64f08976cd9b6216842544",
      "parents": [
        "efbbced361f3ff4ff9e85310ccff894185c4d904"
      ],
      "author": {
        "name": "dann frazier",
        "email": "dannf@hp.com",
        "time": "Wed Nov 26 15:32:27 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 26 15:32:27 2008 -0800"
      },
      "message": "net: Fix soft lockups/OOM issues w/ unix garbage collector\n\nThis is an implementation of David Miller\u0027s suggested fix in:\n  https://bugzilla.redhat.com/show_bug.cgi?id\u003d470201\n\nIt has been updated to use wait_event() instead of\nwait_event_interruptible().\n\nParaphrasing the description from the above report, it makes sendmsg()\nblock while UNIX garbage collection is in progress. This avoids a\nsituation where child processes continue to queue new FDs over a\nAF_UNIX socket to a parent which is in the exit path and running\ngarbage collection on these FDs. This contention can result in soft\nlockups and oom-killing of unrelated processes.\n\nSigned-off-by: dann frazier \u003cdannf@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7e5ab54296a41f590c9cbc976e1c86272f3a7e00",
      "tree": "e3ccf692a222e7c797b3cdbddfc8b09ef8e69d1a",
      "parents": [
        "3ec192559033ed457f0d7856838654c100fc659f"
      ],
      "author": {
        "name": "Rémi Denis-Courmont",
        "email": "remi.denis-courmont@nokia.com",
        "time": "Wed Nov 26 15:26:43 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 26 15:26:43 2008 -0800"
      },
      "message": "Phonet: fix oops in phonet_address_del() on non-Phonet device\n\nA NULL dereference would occur when trying to delete an addres from a\nnetwork device that does not have any Phonet address.\n\nSigned-off-by: Rémi Denis-Courmont \u003cremi.denis-courmont@nokia.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3ec192559033ed457f0d7856838654c100fc659f",
      "tree": "8896e920dee68ded264d858358faca4c2c59621c",
      "parents": [
        "bd51126957eeac96d056c670545ff798c89f63f5"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Nov 26 03:57:44 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 26 03:57:44 2008 -0800"
      },
      "message": "netfilter: ctnetlink: fix GFP_KERNEL allocation under spinlock\n\nThe previous fix for the conntrack creation race (netfilter: ctnetlink:\nfix conntrack creation race) missed a GFP_KERNEL allocation that is\nnow performed while holding a spinlock. Switch to GFP_ATOMIC.\n\nReported-and-tested-by: Zoltan Borbely \u003cbozo@andrews.hu\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8f480c0e4e120911a673ed7385359bf76ae01963",
      "tree": "c9eb4c5cf85dace25e2abf146abc87dcc8fb9d31",
      "parents": [
        "1d71da164d7fb40fac72c0406a4a531265916fc8"
      ],
      "author": {
        "name": "Arjan van de Ven",
        "email": "arjan@linux.intel.com",
        "time": "Tue Nov 25 21:08:13 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 25 21:08:13 2008 -0800"
      },
      "message": "net: make skb_truesize_bug() call WARN()\n\nThe truesize message check is important enough to make it print \"BUG\"\nto the user console... lets also make it important enough to spit a\nbacktrace/module list etc so that kerneloops.org can track them.\n\nSigned-off-by: Arjan van de Ven \u003carjan@linux.intel.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d7713ccc7bec64fbe0e4e39f93b17dfec711db7f",
      "tree": "586afddc7e21ecaa82fc9af369778e53de93fb4e",
      "parents": [
        "11c6dd2c723a9ff9bdd4ee11b2798a08abc94e98",
        "020cf6ba7a91ccc5db359f91e9abba175fd3a0aa"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 25 14:27:58 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 25 14:27:58 2008 -0800"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "020cf6ba7a91ccc5db359f91e9abba175fd3a0aa",
      "tree": "5a6b21a4e81d69bcb550e38a136d35f800b726f8",
      "parents": [
        "02969b38e6f7cef80e71d673d1e512e029a7009f"
      ],
      "author": {
        "name": "Ingo Molnar",
        "email": "mingo@elte.hu",
        "time": "Sun Nov 23 20:09:54 2008 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Nov 25 16:13:09 2008 -0500"
      },
      "message": "net/wireless/reg.c: fix bad WARN_ON in if statement\n\nfix:\n\n  net/wireless/reg.c:348:29: error: macro \"if\" passed 2 arguments, but takes just 1\n\ntriggered by the branch-tracer.\n\nSigned-off-by: Ingo Molnar \u003cmingo@elte.hu\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "3dd3b79aeadc6f6abc5cc78724d7df3dfcc1bd0b",
      "tree": "831eabe86c67c079f1cae81338530e43429009e5",
      "parents": [
        "e91af0af8677198346d5d29f09ab39bb3b0e3faf"
      ],
      "author": {
        "name": "Abhijeet Kolekar",
        "email": "abhijeet.kolekar@intel.com",
        "time": "Thu Nov 20 10:20:31 2008 -0800"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Nov 25 16:13:08 2008 -0500"
      },
      "message": "mac80211 : Fix setting ad-hoc mode and non-ibss channel\n\nPatch fixes the kernel trace when user tries to set\nad-hoc mode on non IBSS channel.\ne.g iwconfig wlan0 chan 36 mode ad-hoc\n\nSigned-off-by: Abhijeet Kolekar \u003cabhijeet.kolekar@intel.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "244f46ae6e9e18f6fc0be7d1f49febde4762c34b",
      "tree": "5d147f9393ffd892b707ceb6ad6e1e0b6098364b",
      "parents": [
        "631339f1e544a4d39a63cfe6708c5bddcd5a2c48"
      ],
      "author": {
        "name": "Bernard Pidoux",
        "email": "bernard.pidoux@upmc.fr",
        "time": "Mon Nov 24 11:49:40 2008 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 25 00:56:20 2008 -0800"
      },
      "message": "rose: zero length frame filtering in af_rose.c\n\nSince changeset e79ad711a0108475c1b3a03815527e7237020b08 from  mainline,\n\u003eFrom David S. Miller,\nempty packet can be transmitted on connected socket for datagram protocols.\n\nHowever, this patch broke a high level application using ROSE network protocol with connected datagram.\n\nBulletin Board Stations perform bulletins forwarding between BBS stations via ROSE network using a forward protocol.\nNow, if for some reason, a buffer in the application software happens to be empty at a specific moment,\nROSE sends an empty packet via unfiltered packet socket.\nWhen received, this ROSE packet introduces perturbations of data exchange of BBS forwarding,\nfor the application message forwarding protocol is waiting for something else.\nWe agree that a more careful programming of the application protocol would avoid this situation and we are\nwilling to debug it.\nBut, as an empty frame is no use and does not have any meaning for ROSE protocol,\nwe may consider filtering zero length data both when sending and receiving socket data.\n\nThe proposed patch repaired BBS data exchange through ROSE network that were broken since 2.6.22.11 kernel.\n\nSigned-off-by: Bernard Pidoux \u003cf6bvp@amsat.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "631339f1e544a4d39a63cfe6708c5bddcd5a2c48",
      "tree": "d3b20999303ea2af64b364b63bb176e0fd5d8e4e",
      "parents": [
        "f79fca55f9a6fe54635ad32ddc8a38f92a94ec30"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 24 16:06:50 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 24 16:06:50 2008 -0800"
      },
      "message": "bridge: netfilter: fix update_pmtu crash with GRE\n\nAs GRE tries to call the update_pmtu function on skb-\u003edst and\nbridge supplies an skb-\u003edst that has a NULL ops field, all is\nnot well.\n\nThis patch fixes this by giving the bridge device an ops field\nwith an update_pmtu function.  For the moment I\u0027ve left all\nother fields blank but we can fill them in later should the\nneed arise.\n\nBased on report and patch by Philip Craig.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b54ad409fd09a395b839fb81f300880d76861c0e",
      "tree": "580b23b89c04c85ad9795b37f81174e1bbb5311b",
      "parents": [
        "5147d14e995c097571d383fe1287fb33345a51ee"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Nov 24 15:56:17 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 24 15:56:17 2008 -0800"
      },
      "message": "netfilter: ctnetlink: fix conntrack creation race\n\nConntrack creation through ctnetlink has two races:\n\n- the timer may expire and free the conntrack concurrently, causing an\n  invalid memory access when attempting to put it in the hash tables\n\n- an identical conntrack entry may be created in the packet processing\n  path in the time between the lookup and hash insertion\n\nHold the conntrack lock between the lookup and insertion to avoid this.\n\nReported-by: Zoltan Borbely \u003cbozo@andrews.hu\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2da2c21d7508d34bc6d600df665d84871b65d2b9",
      "tree": "aac096017d62589c3675d44ffff61dc1676fa9d1",
      "parents": [
        "2c5e76158fcea6e3b9536a74efa7b5e2e846d374"
      ],
      "author": {
        "name": "Tom Tucker",
        "email": "tom@opengridcomputing.com",
        "time": "Sun Nov 23 09:58:08 2008 -0600"
      },
      "committer": {
        "name": "J. Bruce Fields",
        "email": "bfields@citi.umich.edu",
        "time": "Mon Nov 24 10:15:01 2008 -0600"
      },
      "message": "Add a reference to sunrpc in svc_addsock\n\nThe svc_addsock function adds transport instances without taking a\nreference on the sunrpc.ko module, however, the generic transport\ndestruction code drops a reference when a transport instance\nis destroyed.\n\nAdd a try_module_get call to the svc_addsock function for transport\ninstances added by this function.\n\nSigned-off-by: Tom Tucker \u003ctom@opengridcomputing.com\u003e\nSigned-off-by: J. Bruce Fields \u003cbfields@citi.umich.edu\u003e\nTested-by: Jeff Moyer \u003cjmoyer@redhat.com\u003e\n"
    },
    {
      "commit": "7e56b5d698707a9934833c47b24d78fb0bcaf764",
      "tree": "949d9320501fa64e3710acda83487d4c74e52247",
      "parents": [
        "33cf71cee14743185305c61625c4544885055733"
      ],
      "author": {
        "name": "Catalin Marinas",
        "email": "catalin.marinas@arm.com",
        "time": "Fri Nov 21 16:45:22 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Nov 21 16:45:22 2008 -0800"
      },
      "message": "net: Fix memory leak in the proto_register function\n\nIf the slub allocator is used, kmem_cache_create() may merge two or more\nkmem_cache\u0027s into one but the cache name pointer is not updated and\nkmem_cache_name() is no longer guaranteed to return the pointer passed\nto the former function. This patch stores the kmalloc\u0027ed pointers in the\ncorresponding request_sock_ops and timewait_sock_ops structures.\n\nSigned-off-by: Catalin Marinas \u003ccatalin.marinas@arm.com\u003e\nAcked-by: Arnaldo Carvalho de Melo \u003cacme@redhat.com\u003e\nReviewed-by: Christoph Lameter \u003ccl@linux-foundation.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "33cf71cee14743185305c61625c4544885055733",
      "tree": "d05c9fb2fd12d8eede22c261c2db57d30f96a73a",
      "parents": [
        "38ae07e44bb2dc86770555a1acafcb937ec74478"
      ],
      "author": {
        "name": "Petr Tesarik",
        "email": "ptesarik@suse.cz",
        "time": "Fri Nov 21 16:42:58 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Nov 21 16:42:58 2008 -0800"
      },
      "message": "tcp: Do not use TSO/GSO when there is urgent data\n\nThis patch fixes http://bugzilla.kernel.org/show_bug.cgi?id\u003d12014\n\nSince most (if not all) implementations of TSO and even the in-kernel\nsoftware GSO do not update the urgent pointer when splitting a large\nsegment, it is necessary to turn off TSO/GSO for all outgoing traffic\nwith the URG pointer set.\n\nLooking at tcp_current_mss (and the preceding comment) I even think\nthis was the original intention. However, this approach is insufficient,\nbecause TSO/GSO is turned off only for newly created frames, not for\nframes which were already pending at the arrival of a message with\nMSG_OOB set. These frames were created when TSO/GSO was enabled,\nso they may be large, and they will have the urgent pointer set\nin tcp_transmit_skb().\n\nWith this patch, such large packets will be fragmented again before\ngoing to the transmit routine.\n\nAs a side note, at least the following NICs are known to screw up\nthe urgent pointer in the TCP header when doing TSO:\n\n\tIntel 82566MM (PCI ID 8086:1049)\n\tIntel 82566DC (PCI ID 8086:104b)\n\tIntel 82541GI (PCI ID 8086:1076)\n\tBroadcom NetXtreme II BCM5708 (PCI ID 14e4:164c)\n\nSigned-off-by: Petr Tesarik \u003cptesarik@suse.cz\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "23918b03060f6e572168fdde1798a905679d2e06",
      "tree": "4e95edb5030e461a1eb82e2f1fb9cb90a3b46013",
      "parents": [
        "0cb39aa0ac3a9dc64171b43a85d17e539d82f2d6"
      ],
      "author": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Thu Nov 20 16:06:21 2008 -0500"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Nov 20 13:17:40 2008 -0800"
      },
      "message": "SUNRPC: Fix a performance regression in the RPC authentication code\n\nFix a regression reported by Max Kellermann whereby kernel profiling\nshowed that his clients were spending 45% of their time in\nrpcauth_lookup_credcache.\n\nIt turns out that although his processes had identical uid/gid/groups,\ngeneric_match() was failing to detect this, because the task-\u003egroup_info\npointers were not shared. This again lead to the creation of a huge number\nof identical credentials at the RPC layer.\n\nThe regression is fixed by comparing the contents of task-\u003egroup_info\nif the actual pointers are not identical.\n\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "4dd61d92d7204788b93b064a679c9068fc5b8a5f",
      "tree": "90dc522b71d06a336773f919def0fd99d59156c9",
      "parents": [
        "95763dd52b4b9b3578d3428001ece1e11b016ffc",
        "5ece6c2ddd6f7da9e95dc325c742c0f5afbcecbe"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Nov 20 13:12:14 2008 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Nov 20 13:12:14 2008 -0800"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (23 commits)\n  net: fix tiny output corruption of /proc/net/snmp6\n  atl2: don\u0027t request irq on resume if netif running\n  ipv6: use seq_release_private for ip6mr.c /proc entries\n  pkt_sched: fix missing check for packet overrun in qdisc_dump_stab()\n  smc911x: Fix printf format typo in smc911x driver.\n  asix: Fix asix-based cards connecting to 10/100Mbs LAN.\n  mv643xx_eth: fix recycle check bound\n  mv643xx_eth: fix the order of mdiobus_{unregister, free}() calls\n  sh: sh_eth: Update to change of mii_bus\n  TPROXY: supply a struct flowi-\u003eflags argument in inet_sk_rebuild_header()\n  TPROXY: fill struct flowi-\u003eflags in udp_sendmsg()\n  net: ipg.c fix bracing on endian swapping\n  phylib: Fix auto-negotiation restart avoidance\n  net: jme.c rxdesc.flags is __le16, other missing endian swaps\n  phylib: fix phy name example in documentation\n  net: Do not fire linkwatch events until the device is registered.\n  phonet: fix compilation with gcc-3.4\n  ixgbe: fix compilation with gcc-3.4\n  pktgen: fix multiple queue warning\n  net: fix ip_mr_init() error path\n  ...\n"
    },
    {
      "commit": "5ece6c2ddd6f7da9e95dc325c742c0f5afbcecbe",
      "tree": "cf8ebb119403f92df8a296002b9316c9fa38a8a6",
      "parents": [
        "a849854fc7e200d5e5a437dec9c1d0e8b105e50f"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Thu Nov 20 04:20:10 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 20 04:20:10 2008 -0800"
      },
      "message": "net: fix tiny output corruption of /proc/net/snmp6\n\nBecause \"name\" is static, it can be occasionally be filled with\nsomewhat garbage if two processes read /proc/net/snmp6.\n\nAlso, remove useless casts and \"-1\" -- snprintf() correctly terminates it\u0027s\noutput.\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "eedd726efbc439dbed94fb8577e5533a986b341f",
      "tree": "5980fdeb7ad34e2cd3623fe8d3a477121c1e8dbb",
      "parents": [
        "3aa4614da741f10b09559a5675c79e2eff5cccd8"
      ],
      "author": {
        "name": "Benjamin Thery",
        "email": "benjamin.thery@bull.net",
        "time": "Thu Nov 20 04:16:12 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 20 04:16:12 2008 -0800"
      },
      "message": "ipv6: use seq_release_private for ip6mr.c /proc entries\n\nIn ip6mr.c, /proc entries /proc/net/ip6_mr_cache and /proc/net/ip6_mr_vif\nare opened with seq_open_private(), thus seq_release_private() should be \nused to release them.\nShould fix a small memory leak.\n\nSigned-off-by: Benjamin Thery \u003cbenjamin.thery@bull.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3aa4614da741f10b09559a5675c79e2eff5cccd8",
      "tree": "0181c697123716bf574e7819854d373dc6ee18b8",
      "parents": [
        "f7f65d1e8bfaa92c1a419c2a52faeca835659295"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Thu Nov 20 04:07:14 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 20 04:07:14 2008 -0800"
      },
      "message": "pkt_sched: fix missing check for packet overrun in qdisc_dump_stab()\n\nnla_nest_start() might return NULL, causing a NULL pointer dereference.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f7f65d1e8bfaa92c1a419c2a52faeca835659295",
      "tree": "b616a113bddb2728fca89ef3062c16b220cee620",
      "parents": [
        "eafdcb433f854c8cb06747a80fa3df7c72147be6",
        "4018517a1a69a85c3d61b20fa02f187b80773137"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 20 04:01:29 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 20 04:01:29 2008 -0800"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "c82838458200ec4167ce7083b0a17474150c5bf7",
      "tree": "5498ee0aa72c28c8e712fe5a30cd5e48aac1b9bf",
      "parents": [
        "a134f85c131ffd56720e38af2967ec6265480757"
      ],
      "author": {
        "name": "Balazs Scheidler",
        "email": "bazsi@balabit.hu",
        "time": "Thu Nov 20 01:08:06 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 20 01:08:06 2008 -0800"
      },
      "message": "TPROXY: supply a struct flowi-\u003eflags argument in inet_sk_rebuild_header()\n\n    inet_sk_rebuild_header() does a new route lookup if the dst_entry\n    associated with a socket becomes stale. However inet_sk_rebuild_header()\n    didn\u0027t use struct flowi-\u003eflags, causing the route lookup to\n    fail for foreign-bound IP_TRANSPARENT sockets, causing an error\n    state to be set for the sockets in question.\n\nSigned-off-by: Balazs Scheidler \u003cbazsi@balabit.hu\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a134f85c131ffd56720e38af2967ec6265480757",
      "tree": "855f671667da2643274af8d580e16843f4baa393",
      "parents": [
        "b88ed5cc884e4c28d787cf0912b8635376f16a87"
      ],
      "author": {
        "name": "Balazs Scheidler",
        "email": "bazsi@balabit.hu",
        "time": "Thu Nov 20 01:07:24 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 20 01:07:24 2008 -0800"
      },
      "message": "TPROXY: fill struct flowi-\u003eflags in udp_sendmsg()\n\n    udp_sendmsg() didn\u0027t fill struct flowi-\u003eflags, which means that\n    the route lookup would fail for non-local IPs even if the\n    IP_TRANSPARENT sockopt was set.\n\n    This prevents sendto() to work properly for UDP sockets, whereas\n    bind(foreign-ip) + connect() + send() worked fine.\n\nSigned-off-by: Balazs Scheidler \u003cbazsi@balabit.hu\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "de11defebf00007677fb7ee91d9b089b78786fbb",
      "tree": "8219faf1b7992be77a612e778c2573c55f56cf19",
      "parents": [
        "cf7ee554f3a324e98181b0ea249d9d5be3a0acb8"
      ],
      "author": {
        "name": "Ulrich Drepper",
        "email": "drepper@redhat.com",
        "time": "Wed Nov 19 15:36:14 2008 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Nov 19 18:49:57 2008 -0800"
      },
      "message": "reintroduce accept4\n\nIntroduce a new accept4() system call.  The addition of this system call\nmatches analogous changes in 2.6.27 (dup3(), evenfd2(), signalfd4(),\ninotify_init1(), epoll_create1(), pipe2()) which added new system calls\nthat differed from analogous traditional system calls in adding a flags\nargument that can be used to access additional functionality.\n\nThe accept4() system call is exactly the same as accept(), except that\nit adds a flags bit-mask argument.  Two flags are initially implemented.\n(Most of the new system calls in 2.6.27 also had both of these flags.)\n\nSOCK_CLOEXEC causes the close-on-exec (FD_CLOEXEC) flag to be enabled\nfor the new file descriptor returned by accept4().  This is a useful\nsecurity feature to avoid leaking information in a multithreaded\nprogram where one thread is doing an accept() at the same time as\nanother thread is doing a fork() plus exec().  More details here:\nhttp://udrepper.livejournal.com/20407.html \"Secure File Descriptor Handling\",\nUlrich Drepper).\n\nThe other flag is SOCK_NONBLOCK, which causes the O_NONBLOCK flag\nto be enabled on the new open file description created by accept4().\n(This flag is merely a convenience, saving the use of additional calls\nfcntl(F_GETFL) and fcntl (F_SETFL) to achieve the same result.\n\nHere\u0027s a test program.  Works on x86-32.  Should work on x86-64, but\nI (mtk) don\u0027t have a system to hand to test with.\n\nIt tests accept4() with each of the four possible combinations of\nSOCK_CLOEXEC and SOCK_NONBLOCK set/clear in \u0027flags\u0027, and verifies\nthat the appropriate flags are set on the file descriptor/open file\ndescription returned by accept4().\n\nI tested Ulrich\u0027s patch in this thread by applying against 2.6.28-rc2,\nand it passes according to my test program.\n\n/* test_accept4.c\n\n  Copyright (C) 2008, Linux Foundation, written by Michael Kerrisk\n       \u003cmtk.manpages@gmail.com\u003e\n\n  Licensed under the GNU GPLv2 or later.\n*/\n#define _GNU_SOURCE\n#include \u003cunistd.h\u003e\n#include \u003csys/syscall.h\u003e\n#include \u003csys/socket.h\u003e\n#include \u003cnetinet/in.h\u003e\n#include \u003cstdlib.h\u003e\n#include \u003cfcntl.h\u003e\n#include \u003cstdio.h\u003e\n#include \u003cstring.h\u003e\n\n#define PORT_NUM 33333\n\n#define die(msg) do { perror(msg); exit(EXIT_FAILURE); } while (0)\n\n/**********************************************************************/\n\n/* The following is what we need until glibc gets a wrapper for\n  accept4() */\n\n/* Flags for socket(), socketpair(), accept4() */\n#ifndef SOCK_CLOEXEC\n#define SOCK_CLOEXEC    O_CLOEXEC\n#endif\n#ifndef SOCK_NONBLOCK\n#define SOCK_NONBLOCK   O_NONBLOCK\n#endif\n\n#ifdef __x86_64__\n#define SYS_accept4 288\n#elif __i386__\n#define USE_SOCKETCALL 1\n#define SYS_ACCEPT4 18\n#else\n#error \"Sorry -- don\u0027t know the syscall # on this architecture\"\n#endif\n\nstatic int\naccept4(int fd, struct sockaddr *sockaddr, socklen_t *addrlen, int flags)\n{\n   printf(\"Calling accept4(): flags \u003d %x\", flags);\n   if (flags !\u003d 0) {\n       printf(\" (\");\n       if (flags \u0026 SOCK_CLOEXEC)\n           printf(\"SOCK_CLOEXEC\");\n       if ((flags \u0026 SOCK_CLOEXEC) \u0026\u0026 (flags \u0026 SOCK_NONBLOCK))\n           printf(\" \");\n       if (flags \u0026 SOCK_NONBLOCK)\n           printf(\"SOCK_NONBLOCK\");\n       printf(\")\");\n   }\n   printf(\"\\n\");\n\n#if USE_SOCKETCALL\n   long args[6];\n\n   args[0] \u003d fd;\n   args[1] \u003d (long) sockaddr;\n   args[2] \u003d (long) addrlen;\n   args[3] \u003d flags;\n\n   return syscall(SYS_socketcall, SYS_ACCEPT4, args);\n#else\n   return syscall(SYS_accept4, fd, sockaddr, addrlen, flags);\n#endif\n}\n\n/**********************************************************************/\n\nstatic int\ndo_test(int lfd, struct sockaddr_in *conn_addr,\n       int closeonexec_flag, int nonblock_flag)\n{\n   int connfd, acceptfd;\n   int fdf, flf, fdf_pass, flf_pass;\n   struct sockaddr_in claddr;\n   socklen_t addrlen;\n\n   printf(\"\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\\n\");\n\n   connfd \u003d socket(AF_INET, SOCK_STREAM, 0);\n   if (connfd \u003d\u003d -1)\n       die(\"socket\");\n   if (connect(connfd, (struct sockaddr *) conn_addr,\n               sizeof(struct sockaddr_in)) \u003d\u003d -1)\n       die(\"connect\");\n\n   addrlen \u003d sizeof(struct sockaddr_in);\n   acceptfd \u003d accept4(lfd, (struct sockaddr *) \u0026claddr, \u0026addrlen,\n                      closeonexec_flag | nonblock_flag);\n   if (acceptfd \u003d\u003d -1) {\n       perror(\"accept4()\");\n       close(connfd);\n       return 0;\n   }\n\n   fdf \u003d fcntl(acceptfd, F_GETFD);\n   if (fdf \u003d\u003d -1)\n       die(\"fcntl:F_GETFD\");\n   fdf_pass \u003d ((fdf \u0026 FD_CLOEXEC) !\u003d 0) \u003d\u003d\n              ((closeonexec_flag \u0026 SOCK_CLOEXEC) !\u003d 0);\n   printf(\"Close-on-exec flag is %sset (%s); \",\n           (fdf \u0026 FD_CLOEXEC) ? \"\" : \"not \",\n           fdf_pass ? \"OK\" : \"failed\");\n\n   flf \u003d fcntl(acceptfd, F_GETFL);\n   if (flf \u003d\u003d -1)\n       die(\"fcntl:F_GETFD\");\n   flf_pass \u003d ((flf \u0026 O_NONBLOCK) !\u003d 0) \u003d\u003d\n              ((nonblock_flag \u0026 SOCK_NONBLOCK) !\u003d0);\n   printf(\"nonblock flag is %sset (%s)\\n\",\n           (flf \u0026 O_NONBLOCK) ? \"\" : \"not \",\n           flf_pass ? \"OK\" : \"failed\");\n\n   close(acceptfd);\n   close(connfd);\n\n   printf(\"Test result: %s\\n\", (fdf_pass \u0026\u0026 flf_pass) ? \"PASS\" : \"FAIL\");\n   return fdf_pass \u0026\u0026 flf_pass;\n}\n\nstatic int\ncreate_listening_socket(int port_num)\n{\n   struct sockaddr_in svaddr;\n   int lfd;\n   int optval;\n\n   memset(\u0026svaddr, 0, sizeof(struct sockaddr_in));\n   svaddr.sin_family \u003d AF_INET;\n   svaddr.sin_addr.s_addr \u003d htonl(INADDR_ANY);\n   svaddr.sin_port \u003d htons(port_num);\n\n   lfd \u003d socket(AF_INET, SOCK_STREAM, 0);\n   if (lfd \u003d\u003d -1)\n       die(\"socket\");\n\n   optval \u003d 1;\n   if (setsockopt(lfd, SOL_SOCKET, SO_REUSEADDR, \u0026optval,\n                  sizeof(optval)) \u003d\u003d -1)\n       die(\"setsockopt\");\n\n   if (bind(lfd, (struct sockaddr *) \u0026svaddr,\n            sizeof(struct sockaddr_in)) \u003d\u003d -1)\n       die(\"bind\");\n\n   if (listen(lfd, 5) \u003d\u003d -1)\n       die(\"listen\");\n\n   return lfd;\n}\n\nint\nmain(int argc, char *argv[])\n{\n   struct sockaddr_in conn_addr;\n   int lfd;\n   int port_num;\n   int passed;\n\n   passed \u003d 1;\n\n   port_num \u003d (argc \u003e 1) ? atoi(argv[1]) : PORT_NUM;\n\n   memset(\u0026conn_addr, 0, sizeof(struct sockaddr_in));\n   conn_addr.sin_family \u003d AF_INET;\n   conn_addr.sin_addr.s_addr \u003d htonl(INADDR_LOOPBACK);\n   conn_addr.sin_port \u003d htons(port_num);\n\n   lfd \u003d create_listening_socket(port_num);\n\n   if (!do_test(lfd, \u0026conn_addr, 0, 0))\n       passed \u003d 0;\n   if (!do_test(lfd, \u0026conn_addr, SOCK_CLOEXEC, 0))\n       passed \u003d 0;\n   if (!do_test(lfd, \u0026conn_addr, 0, SOCK_NONBLOCK))\n       passed \u003d 0;\n   if (!do_test(lfd, \u0026conn_addr, SOCK_CLOEXEC, SOCK_NONBLOCK))\n       passed \u003d 0;\n\n   close(lfd);\n\n   exit(passed ? EXIT_SUCCESS : EXIT_FAILURE);\n}\n\n[mtk.manpages@gmail.com: rewrote changelog, updated test program]\nSigned-off-by: Ulrich Drepper \u003cdrepper@redhat.com\u003e\nTested-by: Michael Kerrisk \u003cmtk.manpages@gmail.com\u003e\nAcked-by: Michael Kerrisk \u003cmtk.manpages@gmail.com\u003e\nCc: \u003clinux-api@vger.kernel.org\u003e\nCc: \u003clinux-arch@vger.kernel.org\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "b47300168e770b60ab96c8924854c3b0eb4260eb",
      "tree": "8dcdf57ff27c503cf365ae5a98cf30626612b381",
      "parents": [
        "566521d63720ab47576afb85147e5652993bf1e6"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 19 15:33:54 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 19 15:33:54 2008 -0800"
      },
      "message": "net: Do not fire linkwatch events until the device is registered.\n\nSeveral device drivers try to do things like netif_carrier_off()\nbefore register_netdev() is invoked.  This is bogus, but too many\ndrivers do this to fix them all up in one go.\n\nReported-by: Folkert van Heusden \u003cfolkert@vanheusden.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "566521d63720ab47576afb85147e5652993bf1e6",
      "tree": "d9c0d776182aeff7c3e061522d9fedee3d8f09cf",
      "parents": [
        "79aefa45b20940cbb9104464548ff74f80f2395e"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Wed Nov 19 14:17:41 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 19 14:17:41 2008 -0800"
      },
      "message": "phonet: fix compilation with gcc-3.4\n\n  CC [M]  net/phonet/af_phonet.o\nnet/phonet/af_phonet.c: In function `pn_socket_create\u0027:\nnet/phonet/af_phonet.c:38: sorry, unimplemented: inlining failed in call to \u0027phonet_proto_put\u0027: function body not available\nnet/phonet/af_phonet.c:99: sorry, unimplemented: called from here\nmake[3]: *** [net/phonet/af_phonet.o] Error 1\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "bfdbc0acadcc761b94814d78f0acec90f0d760de",
      "tree": "663acbd95be8072e4dfc75ee418796135dfce8dd",
      "parents": [
        "c3e388964baa00d8c3960f23e8c8a1fb3966759e"
      ],
      "author": {
        "name": "Robert Olsson",
        "email": "robert.olsson@its.uu.se",
        "time": "Wed Nov 19 14:09:47 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 19 14:09:47 2008 -0800"
      },
      "message": "pktgen: fix multiple queue warning\n\nAs number of TX queues in unrelated to number of CPU\u0027s we remove this test\nand just make sure nxtq never gets exceeded.\n\nSigned-off-by: Robert Olsson \u003crobert.olsson@its.uu.se\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c3e388964baa00d8c3960f23e8c8a1fb3966759e",
      "tree": "29014a69e1702a641bd782838050db47b7de9c19",
      "parents": [
        "7f0f598a0069d1ab072375965a4b69137233169c"
      ],
      "author": {
        "name": "Benjamin Thery",
        "email": "benjamin.thery@bull.net",
        "time": "Wed Nov 19 14:07:41 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 19 14:07:41 2008 -0800"
      },
      "message": "net: fix ip_mr_init() error path\n\nSimilarly to IPv6 ip6_mr_init() (fixed last week), the order of cleanup\noperations in the error/exit section of ip_mr_init() is completely \ninversed. It should be the other way around.\nAlso a del_timer() is missing in the error path.\n\nI should have guessed last week that this same error existed in ipmr.c\ntoo, as ip6mr.c is largely inspired by ipmr.c.\n\nSigned-off-by: Benjamin Thery \u003cbenjamin.thery@bull.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8e3bad65a59915f2ddc40f62a180ad81695d8440",
      "tree": "d54daf1d8d09192afdccfe913c0a22a6b0c0c5f5",
      "parents": [
        "9b44fb89cab6e01816cdc05d6b59fdcf8100b8c3"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Mon Nov 17 10:59:59 2008 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Nov 18 17:26:26 2008 -0500"
      },
      "message": "mac80211: remove ieee80211_notify_mac\n\nBefore ieee80211_notify_mac() was added, it was presented with the\nuse case of using it to tell mac80211 that the association may\nhave been lost because the firmware crashed/reset.\n\nSince then, it has also been used by iwlwifi to (slightly) speed\nup re-association after resume, a workaround around the fact that\nmac80211 has no suspend/resume handling yet. It is also not used\nby any other drivers, so clearly it cannot be necessary for \"good\nenough\" suspend/resume.\n\nUnfortunately, the callback suffers from a severe problem: It only\nworks for station mode. If suspend/resume happens while in IBSS or\nany other mode (but station), then the callback is pointless.\n\nRecently, it has created a number of locking issues, first because\nit required rtnl locking rather than RCU due to calling sleeping\nfunctions within the critical section, and now because it\u0027s called\nby iwlwifi from the mac80211 workqueue that may not use the rtnl\nbecause it is flushed under rtnl.\n(cf. http://bugzilla.kernel.org/show_bug.cgi?id\u003d12046)\n\nI think, therefore, that we should take a step back, remove it\nentirely for now and add the small feature it provided properly.\nFor suspend and resume we will need to introduce new hooks, and for\nthe case where the firmware was reset the driver will probably\nsimply just pretend it has done a suspend/resume cycle to get\nmac80211 to reprogram the hardware completely, not just try to\nconnect to the current AP again in station mode. When doing so, we\nwill need to take into account locking issues and possibly defer\nto schedule_work from within mac80211 for the resume operation,\nwhile the suspend operation must be done directly.\n\nProper suspend/resume should also not necessarily try to reconnect\nto the current AP, the time spent in suspend may have been short\nenough to not be disconnected from the AP, mac80211 will detect\nthat the AP went out of range quickly if it did, and if the\nassociation is lost then the AP will disassoc as soon as a data\nframe is sent. We might also take into account WWOL then, and\nhave mac80211 program the hardware into such a mode where it is\navailable and requested.\n\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "5f9021cfdc3524a4c5e3d7ae2d049eb7adcd6776",
      "tree": "53e42bd9bb7db0858af5c1de4dd47e0af3ad3c47",
      "parents": [
        "584c650b4e6fa16f9ab45d382f86ad6d9c625227"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Sun Nov 16 23:20:31 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Nov 16 23:20:31 2008 -0800"
      },
      "message": "rtnetlink: propagate error from dev_change_flags in do_setlink()\n\nUnlike ifconfig, iproute doesn\u0027t report an error when setting\nan interface up fails:\n\n(example: put wireless network mac80211 interface into repeater mode\nwith iwconfig but do not set a peer MAC address, it should fail with\n-ENOLINK)\n\nwithout patch:\n# ip link set wlan0 up ; echo $?\n0\n# \n\nwith patch:\n# ip link set wlan0 up ; echo $?\nRTNETLINK answers: Link has been severed\n2\n# \n\nPropagate the return value from dev_change_flags() to fix this.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nTested-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ebfe92ca65c780334bdf847ddc4eca15835bd9c0",
      "tree": "6def944664e96f8394bcc9e268c5ee8e9d64ee16",
      "parents": [
        "eb7c3adb1ca92450870dbb0d347fc986cd5e2af4"
      ],
      "author": {
        "name": "Rémi Denis-Courmont",
        "email": "remi.denis-courmont@nokia.com",
        "time": "Sun Nov 16 19:48:49 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Nov 16 19:48:49 2008 -0800"
      },
      "message": "Phonet: refuse to send bigger than MTU packets\n\nSigned-off-by: Rémi Denis-Courmont \u003cremi.denis-courmont@nokia.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n\n"
    },
    {
      "commit": "5421ae0153b4ba0469967cfd8de96144e3bf3979",
      "tree": "99a47894d513e8726cc96b5eff26b16adfc619b9",
      "parents": [
        "d8c3e23d06c1020f38b7b6290135a9522a2e3052"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Fri Nov 14 14:51:45 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Nov 14 14:51:45 2008 -0800"
      },
      "message": "scm: fix scm_fp_list-\u003elist initialization made in wrong place\n\nThis is the next page of the scm recursion story (the commit \nf8d570a4 net: Fix recursive descent in __scm_destroy()).\n\nIn function scm_fp_dup(), the INIT_LIST_HEAD(\u0026fpl-\u003elist) of newly\ncreated fpl is done *before* the subsequent memcpy from the old \nstructure and thus the freshly initialized list is overwritten.\n\nBut that\u0027s OK, since this initialization is not required at all,\nsince the fpl-\u003elist is list_add-ed at the destruction time in any\ncase (and is unused in other code), so I propose to drop both\ninitializations, rather than moving it after the memcpy.\n\nPlease, correct me if I miss something significant.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e8f6fbf62de37cbc2e179176ac7010d5f4396b67",
      "tree": "ac22d719c3c93d24b7eeda395b3271be60bfc661",
      "parents": [
        "1fa989e80a9a104bf3b81842a5f4c1867d7aa9c4"
      ],
      "author": {
        "name": "Ingo Molnar",
        "email": "mingo@elte.hu",
        "time": "Wed Nov 12 01:38:36 2008 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 13 23:19:10 2008 -0800"
      },
      "message": "lockdep: include/linux/lockdep.h - fix warning in net/bluetooth/af_bluetooth.c\n\nfix this warning:\n\n  net/bluetooth/af_bluetooth.c:60: warning: ‘bt_key_strings’ defined but not used\n  net/bluetooth/af_bluetooth.c:71: warning: ‘bt_slock_key_strings’ defined but not used\n\nthis is a lockdep macro problem in the !LOCKDEP case.\n\nWe cannot convert it to an inline because the macro works on multiple types,\nbut we can mark the parameter used.\n\n[ also clean up a misaligned tab in sock_lock_init_class_and_name() ]\n\n[ also remove #ifdefs from around af_family_clock_key strings - which\n  were certainly added to get rid of the ugly build warnings. ]\n\nSigned-off-by: Ingo Molnar \u003cmingo@elte.hu\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1fa989e80a9a104bf3b81842a5f4c1867d7aa9c4",
      "tree": "ba93b3290e87e302e295f6bd981f159127a36ee5",
      "parents": [
        "9c0188acf6dd6990bac9cd906cd554a1476c6d12"
      ],
      "author": {
        "name": "Randy Dunlap",
        "email": "randy.dunlap@oracle.com",
        "time": "Wed Nov 12 11:05:17 2008 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 12 23:33:57 2008 -0800"
      },
      "message": "9p: restrict RDMA usage\n\nMake 9p\u0027s RDMA option depend on INET since it uses Infiniband rdma_*\nfunctions and that code depends on INET.  Otherwise 9p can try to\nuse symbols which don\u0027t exist.\n\nERROR: \"rdma_destroy_id\" [net/9p/9pnet_rdma.ko] undefined!\nERROR: \"rdma_connect\" [net/9p/9pnet_rdma.ko] undefined!\nERROR: \"rdma_create_id\" [net/9p/9pnet_rdma.ko] undefined!\nERROR: \"rdma_create_qp\" [net/9p/9pnet_rdma.ko] undefined!\nERROR: \"rdma_resolve_route\" [net/9p/9pnet_rdma.ko] undefined!\nERROR: \"rdma_disconnect\" [net/9p/9pnet_rdma.ko] undefined!\nERROR: \"rdma_resolve_addr\" [net/9p/9pnet_rdma.ko] undefined!\n\nI used an if/endif block so that the menu items would remain\npresented together.\n\nAlso correct an article adjective.\n\nSigned-off-by: Randy Dunlap \u003crandy.dunlap@oracle.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9c0188acf6dd6990bac9cd906cd554a1476c6d12",
      "tree": "100ef7c91c64efeb05b3c304d1f8a18dfcb3f941",
      "parents": [
        "6e093d9dfffc9a02cd54d36904c62f705f09900a"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Wed Nov 12 23:23:51 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 12 23:23:51 2008 -0800"
      },
      "message": "net: shy netns_ok check\n\nFailure to pass netns_ok check is SILENT, except some MIB counter is\nincremented somewhere.\n\nAnd adding \"netns_ok \u003d 1\" (after long head-scratching session) is\nusually the last step in making some protocol netns-ready...\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6e093d9dfffc9a02cd54d36904c62f705f09900a",
      "tree": "b9250d24821ffa8edb55fee50e0d695afd23a6f9",
      "parents": [
        "b2af2c1d3e4ddeea9d02c46d0df0c322cc7b7061"
      ],
      "author": {
        "name": "Brian Haley",
        "email": "brian.haley@hp.com",
        "time": "Wed Nov 12 22:59:21 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 12 22:59:21 2008 -0800"
      },
      "message": "ipv6: routing header fixes\n\nThis patch fixes two bugs:\n\n1. setsockopt() of anything but a Type 2 routing header should return\nEINVAL instead of EPERM.  Noticed by Shan Wei\n(shanwei@cn.fujitsu.com).\n\n2. setsockopt()/sendmsg() of a Type 2 routing header with invalid\nlength or segments should return EINVAL.  These values are statically\nfixed in RFC 3775, unlike the variable Type 0 was.\n\nSigned-off-by: Brian Haley \u003cbrian.haley@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ddd535c713c788f3c23c6548c4ba985a7593113c",
      "tree": "bb7ed2fc52c1e99803c47e4c2134ced01161f1f2",
      "parents": [
        "e23a59e1ca6d177a57a7791b3629db93ff1d9813",
        "f7cd168645dda3e9067f24fabbfa787f9a237488"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 12 14:37:29 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 12 14:37:29 2008 -0800"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "db7fb86b0ca565cf3537401612581a8158025cc2",
      "tree": "67da233b8a1958328eb73d39ceecf6fc11c8b30a",
      "parents": [
        "8f7c41d4cec91cdbfa89b4a77d5a628938875366"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Tue Nov 11 11:28:04 2008 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Nov 12 16:49:53 2008 -0500"
      },
      "message": "mac80211: fix notify_mac function\n\nThe ieee80211_notify_mac() function uses ieee80211_sta_req_auth() which\nin turn calls ieee80211_set_disassoc() which calls a few functions that\nneed to be able to sleep, so ieee80211_notify_mac() cannot use RCU\nlocking for the interface list and must use rtnl locking instead.\n\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "d35aac10eb7bcb3b80bef16b60844af0313f47f7",
      "tree": "643428ea3f2d78cf9feb7470d812818f4a8dc690",
      "parents": [
        "8f65b5354b1a34a536641bd915958662e8af5320"
      ],
      "author": {
        "name": "Patrick Ohly",
        "email": "patrick.ohly@intel.com",
        "time": "Wed Nov 12 01:54:56 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 12 01:54:56 2008 -0800"
      },
      "message": "net: put_cmsg_compat + SO_TIMESTAMP[NS]: use same name for value as caller\n\nIn __sock_recv_timestamp() the additional SCM_TIMESTAMP[NS] is used. This\nhas the same value as SO_TIMESTAMP[NS], so this is a purely cosmetic change.\n\nSigned-off-by: Patrick Ohly \u003cpatrick.ohly@intel.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8f65b5354b1a34a536641bd915958662e8af5320",
      "tree": "2870ccd815f0d8524487c1d33aa6349244e33b16",
      "parents": [
        "d809a1595610a7c0b0bd55f159e5dc37def0ac28"
      ],
      "author": {
        "name": "Doug Leith",
        "email": "doug.leith@nuim.ie",
        "time": "Wed Nov 12 01:41:09 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 12 01:41:09 2008 -0800"
      },
      "message": "tcp_htcp: last_cong bug fix\n\nThis patch fixes a minor bug in tcp_htcp.c which has been\nhighlighted by Lachlan Andrew and Lawrence Stewart.  Currently, the\ntime since the last congestion event, which is stored in variable\nlast_cong, is reset whenever there is a state change into\nTCP_CA_Open.  This includes transitions of the type\nTCP_CA_Open-\u003eTCP_CA_Disorder-\u003eTCP_CA_Open which are not associated\nwith backoff of cwnd.  The patch changes last_cong to be updated\nonly on transitions into TCP_CA_Open that occur after experiencing\nthe congestion-related states TCP_CA_Loss, TCP_CA_Recovery,\nTCP_CA_CWR.\n\nSigned-off-by: Doug Leith \u003cdoug.leith@nuim.ie\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0a4cf2c8786219b4871c37240ab9787a61d843ee",
      "tree": "a126516733f3a757711754bbac189417c79d8bcb",
      "parents": [
        "4694516d1987303dd83bfd0efdd36fa5b65d701b",
        "df02c6ff2e3937379b31ea161b53229134fe92f7"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Nov 11 09:20:29 2008 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Nov 11 09:20:29 2008 -0800"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6:\n  dsa: fix master interface allmulti/promisc handling\n  dsa: fix skb-\u003epkt_type when mac address of slave interface differs\n  net: fix setting of skb-\u003etail in skb_recycle_check()\n  net: fix /proc/net/snmp as memory corruptor\n  mac80211: fix a buffer overrun in station debug code\n  netfilter: payload_len is be16, add size of struct rather than size of pointer\n  ipv6: fix ip6_mr_init error path\n  [4/4] dca: fixup initialization dependency\n  [3/4] I/OAT: fix async_tx.callback checking\n  [2/4] I/OAT: fix dma_pin_iovec_pages() error handling\n  [1/4] I/OAT: fix channel resources free for not allocated channels\n  ssb: Fix DMA-API compilation for non-PCI systems\n  SSB: hide empty sub menu\n  vlan: Fix typos in proc output string\n  [netdrvr] usb/hso: Cleanup rfkill error handling\n  sfc: Correct address of gPXE boot configuration in EEPROM\n  el3_common_init() should be __devinit, not __init\n  hso: rfkill type should be WWAN\n  mlx4_en: Start port error flow bug fix\n  af_key: mark policy as dead before destroying\n"
    },
    {
      "commit": "df02c6ff2e3937379b31ea161b53229134fe92f7",
      "tree": "93e76bcd230de65599709b5520bd53c337ebd432",
      "parents": [
        "14ee6742b1b5df275cd2d771b4562b4f808c9419"
      ],
      "author": {
        "name": "Lennert Buytenhek",
        "email": "buytenh@marvell.com",
        "time": "Mon Nov 10 21:53:12 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 10 21:53:12 2008 -0800"
      },
      "message": "dsa: fix master interface allmulti/promisc handling\n\nBefore commit b6c40d68ff6498b7f63ddf97cf0aa818d748dee7 (\"net: only\ninvoke dev-\u003echange_rx_flags when device is UP\"), the dsa driver could\nsort-of get away with only fiddling with the master interface\u0027s\nallmulti/promisc counts in -\u003echange_rx_flags() and not touching them\nin -\u003eopen() or -\u003estop().  After this commit (note that it was merged\nalmost simultaneously with the dsa patches, which is why this wasn\u0027t\ncaught initially), the breakage that was already there became more\napparent.\n\nSince it makes no sense to keep the master interface\u0027s allmulti or\npromisc count pinned for a slave interface that is down, copy the vlan\ndriver\u0027s sync logic (which does exactly what we want) over to dsa to\nfix this.\n\nBug report from Dirk Teurlings \u003cdirk@upexia.nl\u003e and Peter van Valderen\n\u003clinux@ddcrew.com\u003e.\n\nSigned-off-by: Lennert Buytenhek \u003cbuytenh@marvell.com\u003e\nTested-by: Dirk Teurlings \u003cdirk@upexia.nl\u003e\nTested-by: Peter van Valderen \u003clinux@ddcrew.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "14ee6742b1b5df275cd2d771b4562b4f808c9419",
      "tree": "a3e4e3ded1c6f903b3a2abff6e232e473ae69634",
      "parents": [
        "5cd33db2120b5ce972568711156f91da83bff2d7"
      ],
      "author": {
        "name": "Lennert Buytenhek",
        "email": "buytenh@marvell.com",
        "time": "Mon Nov 10 21:52:42 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 10 21:52:42 2008 -0800"
      },
      "message": "dsa: fix skb-\u003epkt_type when mac address of slave interface differs\n\nWhen a dsa slave interface has a mac address that differs from that\nof the master interface, eth_type_trans() won\u0027t explicitly set\nskb-\u003epkt_type back to PACKET_HOST -- we need to do this ourselves\nbefore calling eth_type_trans().\n\nSigned-off-by: Lennert Buytenhek \u003cbuytenh@marvell.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5cd33db2120b5ce972568711156f91da83bff2d7",
      "tree": "764e7b41ee2ffdf0e42a7dd005ece814ce88680d",
      "parents": [
        "b971e7ac834e9f4bda96d5a96ae9abccd01c1dd8"
      ],
      "author": {
        "name": "Lennert Buytenhek",
        "email": "buytenh@marvell.com",
        "time": "Mon Nov 10 21:45:05 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 10 21:45:05 2008 -0800"
      },
      "message": "net: fix setting of skb-\u003etail in skb_recycle_check()\n\nSince skb_reset_tail_pointer() reads skb-\u003edata, we need to set\nskb-\u003edata before calling skb_reset_tail_pointer().  This was causing\nspurious skb_over_panic()s from skb_put() being called on a recycled\nskb that had its skb-\u003etail set to beyond where it should have been.\n\nBug report from Peter van Valderen \u003clinux@ddcrew.com\u003e.\n\nSigned-off-by: Lennert Buytenhek \u003cbuytenh@marvell.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b971e7ac834e9f4bda96d5a96ae9abccd01c1dd8",
      "tree": "35c8712758f3113030da5e3a295fe9f8c4b70d25",
      "parents": [
        "013cd397532e5803a1625954a884d021653da720"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Mon Nov 10 21:43:08 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 10 21:43:08 2008 -0800"
      },
      "message": "net: fix /proc/net/snmp as memory corruptor\n\nicmpmsg_put() can happily corrupt kernel memory, using a static\ntable and forgetting to reset an array index in a loop.\n\nRemove the static array since its not safe without proper locking.\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "013cd397532e5803a1625954a884d021653da720",
      "tree": "36ff53456e2acc9e179a8427a50ca3f33420b47b",
      "parents": [
        "b7b45f47d6f8c83a0f958d7e2924468b6942dd9e"
      ],
      "author": {
        "name": "Jianjun Kong",
        "email": "jianjun@zeuux.org",
        "time": "Mon Nov 10 21:37:39 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 10 21:37:39 2008 -0800"
      },
      "message": "mac80211: fix a buffer overrun in station debug code\n\nnet/mac80211/debugfs_sta.c\nThe trailing zero was written to state[4], it\u0027s out of bounds.\n\nSigned-off-by: Jianjun Kong \u003cjianjun@zeuux.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b7b45f47d6f8c83a0f958d7e2924468b6942dd9e",
      "tree": "89697247a2995d339eef39081b72461402b8f965",
      "parents": [
        "87b30a6530218cde431a659f2c118cb72175507c"
      ],
      "author": {
        "name": "Harvey Harrison",
        "email": "harvey.harrison@gmail.com",
        "time": "Mon Nov 10 16:46:06 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 10 16:46:06 2008 -0800"
      },
      "message": "netfilter: payload_len is be16, add size of struct rather than size of pointer\n\npayload_len is a be16 value, not cpu_endian, also the size of a ponter\nto a struct ipv6hdr was being added, not the size of the struct itself.\n\nSigned-off-by: Harvey Harrison \u003charvey.harrison@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "87b30a6530218cde431a659f2c118cb72175507c",
      "tree": "792683c82c1ddf7728698c68301cdaa67997bc8e",
      "parents": [
        "1207e795568a368928dfd23d6817e47f2e8097e3"
      ],
      "author": {
        "name": "Benjamin Thery",
        "email": "benjamin.thery@bull.net",
        "time": "Mon Nov 10 16:34:11 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 10 16:34:11 2008 -0800"
      },
      "message": "ipv6: fix ip6_mr_init error path\n\nThe order of cleanup operations in the error/exit section of ip6_mr_init()\nis completely inversed. It should be the other way around.\nAlso a del_timer() is missing in the error path.\n\nSigned-off-by: Benjamin Thery \u003cbenjamin.thery@bull.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "309f796f301bf1c2731d9b9eb8642c76b523ebf7",
      "tree": "5f4a2cbcf4775a4fc5494778aa376a22d7065531",
      "parents": [
        "ffaf4c76526aaf94698e0c0612f09a6128437ad4"
      ],
      "author": {
        "name": "Ferenc Wagner",
        "email": "wferi@niif.hu",
        "time": "Mon Nov 10 13:37:40 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 10 13:37:40 2008 -0800"
      },
      "message": "vlan: Fix typos in proc output string\n\nSigned-off-by: Ferenc Wagner \u003cwferi@niif.hu\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6209344f5a3795d34b7f2c0061f49802283b6bdd",
      "tree": "5c037ddbb8caac17b0c6101c9ab86387df106d41",
      "parents": [
        "058e3739f6b0753696db1952378de9e8d2a11735"
      ],
      "author": {
        "name": "Miklos Szeredi",
        "email": "mszeredi@suse.cz",
        "time": "Sun Nov 09 15:23:57 2008 +0100"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sun Nov 09 11:17:33 2008 -0800"
      },
      "message": "net: unix: fix inflight counting bug in garbage collector\n\nPreviously I assumed that the receive queues of candidates don\u0027t\nchange during the GC.  This is only half true, nothing can be received\nfrom the queues (see comment in unix_gc()), but buffers could be added\nthrough the other half of the socket pair, which may still have file\ndescriptors referring to it.\n\nThis can result in inc_inflight_move_tail() erronously increasing the\n\"inflight\" counter for a unix socket for which dec_inflight() wasn\u0027t\npreviously called.  This in turn can trigger the \"BUG_ON(total_refs \u003c\ninflight_refs)\" in a later garbage collection run.\n\nFix this by only manipulating the \"inflight\" counter for sockets which\nare candidates themselves.  Duplicating the file references in\nunix_attach_fds() is also needed to prevent a socket becoming a\ncandidate for GC while the skb that contains it is not yet queued.\n\nReported-by: Andrea Bittau \u003ca.bittau@cs.ucl.ac.uk\u003e\nSigned-off-by: Miklos Szeredi \u003cmszeredi@suse.cz\u003e\nCC: stable@kernel.org\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "70e90679ffce0937deb77e2bd8bd918a24a897fd",
      "tree": "12950c5e0de1a0c86dd412474066cedef418b1c4",
      "parents": [
        "4bab0ea1d42dd1927af9df6fbf0003fc00617c50"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Thu Nov 06 23:08:37 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 06 23:08:37 2008 -0800"
      },
      "message": "af_key: mark policy as dead before destroying\n\nxfrm_policy_destroy() will oops if not dead policy is passed to it.\nOn error path in pfkey_compile_policy() exactly this happens.\n\nOopsable for CAP_NET_ADMIN owners.\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4bab0ea1d42dd1927af9df6fbf0003fc00617c50",
      "tree": "880cea7be13f71934f54a59c9fac9f196f8805c1",
      "parents": [
        "a15a82f42c5ee519d28f08c932803a9fd5168fc4",
        "ca409d6e08c35b01965d9211c61dbd216286f8ff"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Nov 06 16:43:44 2008 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Nov 06 16:44:23 2008 -0800"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6:\n  net: Fix recursive descent in __scm_destroy().\n  iwl3945: fix deadlock on suspend\n  iwl3945: do not send scan command if channel count zero\n  iwl3945: clear scanning bits upon failure\n  ath5k: correct handling of rx status fields\n  zd1211rw: Add 2 device IDs\n  Fix logic error in rfkill_check_duplicity\n  iwlagn: avoid sleep in softirq context\n  iwlwifi: clear scanning bits upon failure\n  Revert \"ath5k: honor FIF_BCN_PRBRESP_PROMISC in STA mode\"\n  tcp: Fix recvmsg MSG_PEEK influence of blocking behavior.\n  netfilter: netns ct: walk netns list under RTNL\n  ipv6: fix run pending DAD when interface becomes ready\n  net/9p: fix printk format warnings\n  net: fix packet socket delivery in rx irq handler\n  xfrm: Have af-specific init_tempsel() initialize family field of temporary selector\n"
    },
    {
      "commit": "ca409d6e08c35b01965d9211c61dbd216286f8ff",
      "tree": "2bb4d7edbbbc98839426b6c08ed762288427b012",
      "parents": [
        "3b53fbf4314594fa04544b02b2fc6e607912da18",
        "d54bc4e3fc5c56600a13c9ebc0a7e1077ac05d59"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 06 15:52:00 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 06 15:52:00 2008 -0800"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "39d4e58d36321b3c3b4025d9bf28bf026c2a5bb1",
      "tree": "55f553b6d1480bd18dda06e3ab876fbe88e721ba",
      "parents": [
        "067ab19923673e3d8c982d877bedb9d65c976c22",
        "b0d5fdef521b1eadb3fc2c1283000af7ef0297bc"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Nov 06 15:45:57 2008 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Nov 06 15:45:57 2008 -0800"
      },
      "message": "Merge branch \u0027for-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/ericvh/v9fs\n\n* \u0027for-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/ericvh/v9fs:\n  net/9p: fix printk format warnings\n  unsigned fid-\u003efid cannot be negative\n  9p: rdma: remove duplicated #include\n  p9: Fix leak of waitqueue in request allocation path\n  9p: Remove unneeded free of fcall for Flush\n  9p: Make all client spin locks IRQ safe\n  9p: rdma: Set trans prior to requesting async connection ops\n"
    },
    {
      "commit": "3b53fbf4314594fa04544b02b2fc6e607912da18",
      "tree": "af88f6c7ecbdf06719c92cc8891f75f497b70555",
      "parents": [
        "518a09ef11f8454f4676125d47c3e775b300c6a5"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 06 15:45:32 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 06 15:45:32 2008 -0800"
      },
      "message": "net: Fix recursive descent in __scm_destroy().\n\n__scm_destroy() walks the list of file descriptors in the scm_fp_list\npointed to by the scm_cookie argument.\n\nThose, in turn, can close sockets and invoke __scm_destroy() again.\n\nThere is nothing which limits how deeply this can occur.\n\nThe idea for how to fix this is from Linus.  Basically, we do all of\nthe fput()s at the top level by collecting all of the scm_fp_list\nobjects hit by an fput().  Inside of the initial __scm_destroy() we\nkeep running the list until it is empty.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f8d570a4745835f2238a33b537218a1bb03fc671",
      "tree": "776c2909523c684f0954949a2947ff0a792ba457",
      "parents": [
        "75fa67706cce5272bcfc51ed646f2da21f3bdb6e"
      ],
      "author": {
        "name": "David Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 06 00:37:40 2008 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Nov 06 13:51:50 2008 -0800"
      },
      "message": "net: Fix recursive descent in __scm_destroy().\n\n__scm_destroy() walks the list of file descriptors in the scm_fp_list\npointed to by the scm_cookie argument.\n\nThose, in turn, can close sockets and invoke __scm_destroy() again.\n\nThere is nothing which limits how deeply this can occur.\n\nThe idea for how to fix this is from Linus.  Basically, we do all of\nthe fput()s at the top level by collecting all of the scm_fp_list\nobjects hit by an fput().  Inside of the initial __scm_destroy() we\nkeep running the list until it is empty.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "4a9d916717de0aab4313d43817164577255242fb",
      "tree": "504d7b6df2e0998eb2f4df3c6e4a1939d97b1598",
      "parents": [
        "964d2777438bf7687324243d38ade538d9bbfe3c"
      ],
      "author": {
        "name": "Jonathan McDowell",
        "email": "noodles@earth.li",
        "time": "Thu Oct 30 22:46:48 2008 +0000"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Thu Nov 06 16:37:09 2008 -0500"
      },
      "message": "Fix logic error in rfkill_check_duplicity\n\n\u003e I\u0027ll have a prod at why the [hso] rfkill stuff isn\u0027t working next\n\nOk, I believe this is due to the addition of rfkill_check_duplicity in\nrfkill and the fact that test_bit actually returns a negative value\nrather than the postive one expected (which is of course equally true).\nSo when the second WLAN device (the hso device, with the EEE PC WLAN\nbeing the first) comes along rfkill_check_duplicity returns a negative\nvalue and so rfkill_register returns an error. Patch below fixes this\nfor me.\n\nSigned-Off-By: Jonathan McDowell \u003cnoodles@earth.li\u003e\nAcked-by: Henrique de Moraes Holschuh \u003chmh@hmh.eng.br\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "b0d5fdef521b1eadb3fc2c1283000af7ef0297bc",
      "tree": "67bc3ed16e1aff939e724abdd46c60fa7de02fe9",
      "parents": [
        "9f3e9bbe62b0bdbbaa7c689a68a22a7d3c1670f0"
      ],
      "author": {
        "name": "Randy Dunlap",
        "email": "randy.dunlap@oracle.com",
        "time": "Tue Nov 04 20:46:46 2008 -0800"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Wed Nov 05 13:19:07 2008 -0600"
      },
      "message": "net/9p: fix printk format warnings\n\nFix printk format warnings in net/9p.\nBuilt cleanly on 7 arches.\n\nnet/9p/client.c:820: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 4 has type \u0027u64\u0027\nnet/9p/client.c:820: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 5 has type \u0027u64\u0027\nnet/9p/client.c:867: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 4 has type \u0027u64\u0027\nnet/9p/client.c:867: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 5 has type \u0027u64\u0027\nnet/9p/client.c:932: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 5 has type \u0027u64\u0027\nnet/9p/client.c:932: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 6 has type \u0027u64\u0027\nnet/9p/client.c:982: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 4 has type \u0027u64\u0027\nnet/9p/client.c:982: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 5 has type \u0027u64\u0027\nnet/9p/client.c:1025: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 4 has type \u0027u64\u0027\nnet/9p/client.c:1025: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 5 has type \u0027u64\u0027\nnet/9p/client.c:1227: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 7 has type \u0027u64\u0027\nnet/9p/client.c:1227: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 12 has type \u0027u64\u0027\nnet/9p/client.c:1227: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 8 has type \u0027u64\u0027\nnet/9p/client.c:1227: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 13 has type \u0027u64\u0027\nnet/9p/client.c:1252: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 7 has type \u0027u64\u0027\nnet/9p/client.c:1252: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 12 has type \u0027u64\u0027\nnet/9p/client.c:1252: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 8 has type \u0027u64\u0027\nnet/9p/client.c:1252: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 13 has type \u0027u64\u0027\n\nSigned-off-by: Randy Dunlap \u003crandy.dunlap@oracle.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "9f3e9bbe62b0bdbbaa7c689a68a22a7d3c1670f0",
      "tree": "bec9f1b0880c5d1b89d3dc297d53951c5da4231b",
      "parents": [
        "1558c6214904c636d5a37f05f84202d6cdd9cff8"
      ],
      "author": {
        "name": "Roel Kluin",
        "email": "roel.kluin@gmail.com",
        "time": "Tue Oct 28 14:22:43 2008 -0500"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Wed Nov 05 13:19:07 2008 -0600"
      },
      "message": "unsigned fid-\u003efid cannot be negative\n\nSigned-off-by: Roel Kluin \u003croel.kluin@gmail.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "1558c6214904c636d5a37f05f84202d6cdd9cff8",
      "tree": "32f9693181e2690912961f5c8cf0edbe28e5f9a7",
      "parents": [
        "45abdf1c7be80d6ec3b0b14e59ee75a0d5d9fb37"
      ],
      "author": {
        "name": "Huang Weiyi",
        "email": "weiyi.huang@gmail.com",
        "time": "Mon Oct 27 13:15:16 2008 -0500"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Wed Nov 05 13:19:07 2008 -0600"
      },
      "message": "9p: rdma: remove duplicated #include\n\nRemoved duplicated #include \u003crdma/ib_verbs.h\u003e in\nnet/9p/trans_rdma.c.\n\nSigned-off-by: Huang Weiyi \u003cweiyi.huang@gmail.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "45abdf1c7be80d6ec3b0b14e59ee75a0d5d9fb37",
      "tree": "34a5ea23b63df0da422ff161ec580f9b2ca54680",
      "parents": [
        "82b189eaaf6186b7694317632255fa87460820a0"
      ],
      "author": {
        "name": "Tom Tucker",
        "email": "tom@opengridcomputing.com",
        "time": "Thu Oct 23 16:33:25 2008 -0500"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Wed Nov 05 13:19:06 2008 -0600"
      },
      "message": "p9: Fix leak of waitqueue in request allocation path\n\nIf a T or R fcall cannot be allocated, the function returns an error\nbut neglects to free the wait queue that was successfully allocated.\n\nIf it comes through again a second time this wq will be overwritten\nwith a new allocation and the old allocation will be leaked.\n\nAlso, if the client is subsequently closed, the close path will\nattempt to clean up these allocations, so set the req fields to\nNULL to avoid duplicate free.\n\nSigned-off-by: Tom Tucker \u003ctom@opengridcomputing.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "82b189eaaf6186b7694317632255fa87460820a0",
      "tree": "06b6e37183b7ab4a0e7e9202cdb83c36504b10c5",
      "parents": [
        "cac23d6505546f4cfa42d949ec46d431a44bd39c"
      ],
      "author": {
        "name": "Tom Tucker",
        "email": "tom@opengridcomputing.com",
        "time": "Thu Oct 23 16:32:28 2008 -0500"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Wed Nov 05 13:19:06 2008 -0600"
      },
      "message": "9p: Remove unneeded free of fcall for Flush\n\nT and R fcall are reused until the client is destroyed. There does\nnot need to be a special case for Flush\n\nSigned-off-by: Tom Tucker \u003ctom@opengridcomputing.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "cac23d6505546f4cfa42d949ec46d431a44bd39c",
      "tree": "bdeec0c970ef4cb1ebcb6e479eff0429f6381fed",
      "parents": [
        "517ac45af4b55913587279d89001171c222f22e7"
      ],
      "author": {
        "name": "Tom Tucker",
        "email": "tom@opengridcomputing.com",
        "time": "Thu Oct 23 16:31:02 2008 -0500"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Wed Nov 05 13:19:06 2008 -0600"
      },
      "message": "9p: Make all client spin locks IRQ safe\n\nThe client lock must be IRQ safe. Some of the lock acquisition paths\ntook regular spin locks.\n\nSigned-off-by: Tom Tucker \u003ctom@opengridcomputing.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "517ac45af4b55913587279d89001171c222f22e7",
      "tree": "b3f30f82d27c7b0df885152ce34e9f475f6470dd",
      "parents": [
        "75fa67706cce5272bcfc51ed646f2da21f3bdb6e"
      ],
      "author": {
        "name": "Tom Tucker",
        "email": "tom@opengridcomputing.com",
        "time": "Thu Oct 23 16:30:13 2008 -0500"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Wed Nov 05 13:19:06 2008 -0600"
      },
      "message": "9p: rdma: Set trans prior to requesting async connection ops\n\nThe RDMA connection manager is fundamentally asynchronous.\nSince the async callback context is the client pointer, the\ntransport in the client struct needs to be set prior to calling\nthe first async op.\n\nSigned-off-by: Tom Tucker \u003ctom@opengridcomputing.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "518a09ef11f8454f4676125d47c3e775b300c6a5",
      "tree": "a22f9f9de58e91d3287bcd21277e9378de49e18f",
      "parents": [
        "efb9a8c28ca0edd9e2572117105ebad9bbc0c368"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 05 03:36:01 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 05 03:36:01 2008 -0800"
      },
      "message": "tcp: Fix recvmsg MSG_PEEK influence of blocking behavior.\n\nVito Caputo noticed that tcp_recvmsg() returns immediately from\npartial reads when MSG_PEEK is used.  In particular, this means that\nSO_RCVLOWAT is not respected.\n\nSimply remove the test.  And this matches the behavior of several\nother systems, including BSD.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "efb9a8c28ca0edd9e2572117105ebad9bbc0c368",
      "tree": "f8fe25e3ba4372dcc5510de2dc27481a954417ae",
      "parents": [
        "e3ec6cfc260e2322834e200c2fa349cdf104fd13"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Wed Nov 05 03:03:18 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 05 03:03:18 2008 -0800"
      },
      "message": "netfilter: netns ct: walk netns list under RTNL\n\nnetns list (just list) is under RTNL. But helper and proto unregistration\nhappen during rmmod when RTNL is not held, and that\u0027s how it was tested:\nmodprobe/rmmod vs clone(CLONE_NEWNET)/exit.\n\nBUG: unable to handle kernel paging request at 0000000000100100\t\u003c\u003d\u003d\u003d\nIP: [\u003cffffffffa009890f\u003e] nf_conntrack_l4proto_unregister+0x96/0xae [nf_conntrack]\nPGD 15e300067 PUD 15e1d8067 PMD 0\nOops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC\nlast sysfs file: /sys/kernel/uevent_seqnum\nCPU 0\nModules linked in: nf_conntrack_proto_sctp(-) nf_conntrack_proto_dccp(-) af_packet iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 iptable_filter ip_tables xt_tcpudp ip6table_filter ip6_tables x_tables ipv6 sr_mod cdrom [last unloaded: nf_conntrack_proto_sctp]\nPid: 16758, comm: rmmod Not tainted 2.6.28-rc2-netns-xfrm #3\nRIP: 0010:[\u003cffffffffa009890f\u003e]  [\u003cffffffffa009890f\u003e] nf_conntrack_l4proto_unregister+0x96/0xae [nf_conntrack]\nRSP: 0018:ffff88015dc1fec8  EFLAGS: 00010212\nRAX: 0000000000000000 RBX: 00000000001000f8 RCX: 0000000000000000\nRDX: ffffffffa009575c RSI: 0000000000000003 RDI: ffffffffa00956b5\nRBP: ffff88015dc1fed8 R08: 0000000000000002 R09: 0000000000000000\nR10: 0000000000000000 R11: ffff88015dc1fe48 R12: ffffffffa0458f60\nR13: 0000000000000880 R14: 00007fff4c361d30 R15: 0000000000000880\nFS:  00007f624435a6f0(0000) GS:ffffffff80521580(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b\nCR2: 0000000000100100 CR3: 0000000168969000 CR4: 00000000000006e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400\nProcess rmmod (pid: 16758, threadinfo ffff88015dc1e000, task ffff880179864218)\nStack:\n ffffffffa0459100 0000000000000000 ffff88015dc1fee8 ffffffffa0457934\n ffff88015dc1ff78 ffffffff80253fef 746e6e6f635f666e 6f72705f6b636172\n 00707463735f6f74 ffffffff8024cb30 00000000023b8010 0000000000000000\nCall Trace:\n [\u003cffffffffa0457934\u003e] nf_conntrack_proto_sctp_fini+0x10/0x1e [nf_conntrack_proto_sctp]\n [\u003cffffffff80253fef\u003e] sys_delete_module+0x19f/0x1fe\n [\u003cffffffff8024cb30\u003e] ? trace_hardirqs_on_caller+0xf0/0x114\n [\u003cffffffff803ea9b2\u003e] ? trace_hardirqs_on_thunk+0x3a/0x3f\n [\u003cffffffff8020b52b\u003e] system_call_fastpath+0x16/0x1b\nCode: 13 35 e0 e8 c4 6c 1a e0 48 8b 1d 6d c6 46 e0 eb 16 48 89 df 4c 89 e2 48 c7 c6 fc 85 09 a0 e8 61 cd ff ff 48 8b 5b 08 48 83 eb 08 \u003c48\u003e 8b 43 08 0f 18 08 48 8d 43 08 48 3d 60 4f 50 80 75 d3 5b 41\nRIP  [\u003cffffffffa009890f\u003e] nf_conntrack_l4proto_unregister+0x96/0xae [nf_conntrack]\n RSP \u003cffff88015dc1fec8\u003e\nCR2: 0000000000100100\n---[ end trace bde8ac82debf7192 ]---\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e3ec6cfc260e2322834e200c2fa349cdf104fd13",
      "tree": "997cfb56b22da747ff2e78acbb54e0bb694abee5",
      "parents": [
        "b22cecdd8fa4667ebab02def0866387e709927ee"
      ],
      "author": {
        "name": "Benjamin Thery",
        "email": "benjamin.thery@bull.net",
        "time": "Wed Nov 05 01:43:57 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 05 01:43:57 2008 -0800"
      },
      "message": "ipv6: fix run pending DAD when interface becomes ready\n\nWith some net devices types, an IPv6 address configured while the\ninterface was down can stay \u0027tentative\u0027 forever, even after the interface\nis set up. In some case, pending IPv6 DADs are not executed when the\ndevice becomes ready.\n\nI observed this while doing some tests with kvm. If I assign an IPv6 \naddress to my interface eth0 (kvm driver rtl8139) when it is still down\nthen the address is flagged tentative (IFA_F_TENTATIVE). Then, I set\neth0 up, and to my surprise, the address stays \u0027tentative\u0027, no DAD is\nexecuted and the address can\u0027t be pinged.\n\nI also observed the same behaviour, without kvm, with virtual interfaces\ntypes macvlan and veth.\n\nSome easy steps to reproduce the issue with macvlan:\n\n1. ip link add link eth0 type macvlan\n2. ip -6 addr add 2003::ab32/64 dev macvlan0\n3. ip addr show dev macvlan0\n   ... \n   inet6 2003::ab32/64 scope global tentative\n   ...\n4. ip link set macvlan0 up\n5. ip addr show dev macvlan0\n   ...\n   inet6 2003::ab32/64 scope global tentative\n   ...\n   Address is still tentative\n\nI think there\u0027s a bug in net/ipv6/addrconf.c, addrconf_notify():\naddrconf_dad_run() is not always run when the interface is flagged IF_READY.\nCurrently it is only run when receiving NETDEV_CHANGE event. Looks like\nsome (virtual) devices doesn\u0027t send this event when becoming up.\n\nFor both NETDEV_UP and NETDEV_CHANGE events, when the interface becomes\nready, run_pending should be set to 1. Patch below.\n\n\u0027run_pending \u003d 1\u0027 could be moved below the if/else block but it makes \nthe code less readable.\n\nSigned-off-by: Benjamin Thery \u003cbenjamin.thery@bull.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b22cecdd8fa4667ebab02def0866387e709927ee",
      "tree": "4d85f7c7cae9868a4a98851829af393c4543c43b",
      "parents": [
        "9b22ea560957de1484e6b3e8538f7eef202e3596"
      ],
      "author": {
        "name": "Randy Dunlap",
        "email": "randy.dunlap@oracle.com",
        "time": "Wed Nov 05 01:35:55 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 05 01:35:55 2008 -0800"
      },
      "message": "net/9p: fix printk format warnings\n\nFix printk format warnings in net/9p.\nBuilt cleanly on 7 arches.\n\nnet/9p/client.c:820: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 4 has type \u0027u64\u0027\nnet/9p/client.c:820: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 5 has type \u0027u64\u0027\nnet/9p/client.c:867: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 4 has type \u0027u64\u0027\nnet/9p/client.c:867: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 5 has type \u0027u64\u0027\nnet/9p/client.c:932: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 5 has type \u0027u64\u0027\nnet/9p/client.c:932: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 6 has type \u0027u64\u0027\nnet/9p/client.c:982: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 4 has type \u0027u64\u0027\nnet/9p/client.c:982: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 5 has type \u0027u64\u0027\nnet/9p/client.c:1025: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 4 has type \u0027u64\u0027\nnet/9p/client.c:1025: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 5 has type \u0027u64\u0027\nnet/9p/client.c:1227: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 7 has type \u0027u64\u0027\nnet/9p/client.c:1227: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 12 has type \u0027u64\u0027\nnet/9p/client.c:1227: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 8 has type \u0027u64\u0027\nnet/9p/client.c:1227: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 13 has type \u0027u64\u0027\nnet/9p/client.c:1252: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 7 has type \u0027u64\u0027\nnet/9p/client.c:1252: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 12 has type \u0027u64\u0027\nnet/9p/client.c:1252: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 8 has type \u0027u64\u0027\nnet/9p/client.c:1252: warning: format \u0027%llx\u0027 expects type \u0027long long unsigned int\u0027, but argument 13 has type \u0027u64\u0027\n\nSigned-off-by: Randy Dunlap \u003crandy.dunlap@oracle.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9b22ea560957de1484e6b3e8538f7eef202e3596",
      "tree": "e922feeebfc8795e8ec2f02b58a99a23ae0ce74b",
      "parents": [
        "79654a7698195fa043063092f5c1ca5245276fba"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue Nov 04 14:49:57 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 04 14:49:57 2008 -0800"
      },
      "message": "net: fix packet socket delivery in rx irq handler\n\nThe changes to deliver hardware accelerated VLAN packets to packet\nsockets (commit bc1d0411) caused a warning for non-NAPI drivers.\nThe __vlan_hwaccel_rx() function is called directly from the drivers\nRX function, for non-NAPI drivers that means its still in RX IRQ\ncontext:\n\n[   27.779463] ------------[ cut here ]------------\n[   27.779509] WARNING: at kernel/softirq.c:136 local_bh_enable+0x37/0x81()\n...\n[   27.782520]  [\u003cc0264755\u003e] netif_nit_deliver+0x5b/0x75\n[   27.782590]  [\u003cc02bba83\u003e] __vlan_hwaccel_rx+0x79/0x162\n[   27.782664]  [\u003cf8851c1d\u003e] atl1_intr+0x9a9/0xa7c [atl1]\n[   27.782738]  [\u003cc0155b17\u003e] handle_IRQ_event+0x23/0x51\n[   27.782808]  [\u003cc015692e\u003e] handle_edge_irq+0xc2/0x102\n[   27.782878]  [\u003cc0105fd5\u003e] do_IRQ+0x4d/0x64\n\nSplit hardware accelerated VLAN reception into two parts to fix this:\n\n- __vlan_hwaccel_rx just stores the VLAN TCI and performs the VLAN\n  device lookup, then calls netif_receive_skb()/netif_rx()\n\n- vlan_hwaccel_do_receive(), which is invoked by netif_receive_skb()\n  in softirq context, performs the real reception and delivery to\n  packet sockets.\n\nReported-and-tested-by: Ramon Casellas \u003cramon.casellas@cttc.es\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "79654a7698195fa043063092f5c1ca5245276fba",
      "tree": "28089eb142f4d67e241db0bf01990998e922c028",
      "parents": [
        "bbb770e7ab9a436752babfc8765e422d7481be1f"
      ],
      "author": {
        "name": "Andreas Steffen",
        "email": "andreas.steffen@strongswan.org",
        "time": "Tue Nov 04 14:49:19 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 04 14:49:19 2008 -0800"
      },
      "message": "xfrm: Have af-specific init_tempsel() initialize family field of temporary selector\n\nWhile adding MIGRATE support to strongSwan, Andreas Steffen noticed that\nthe selectors provided in XFRM_MSG_ACQUIRE have their family field\nuninitialized (those in MIGRATE do have their family set).\n\nLooking at the code, this is because the af-specific init_tempsel()\n(called via afinfo-\u003einit_tempsel() in xfrm_init_tempsel()) do not set\nthe value.\n\nReported-by: Andreas Steffen \u003candreas.steffen@strongswan.org\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: Arnaud Ebalard \u003carno@natisbad.org\u003e\n"
    },
    {
      "commit": "75fa67706cce5272bcfc51ed646f2da21f3bdb6e",
      "tree": "c60c18f4fd4c0853feee6bb84b9fdadcb33e59e5",
      "parents": [
        "4edfd20fafae41d77f210417b43d1416a733f48c",
        "bbb770e7ab9a436752babfc8765e422d7481be1f"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Nov 04 08:30:12 2008 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Nov 04 08:30:12 2008 -0800"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6:\n  xfrm: Fix xfrm_policy_gc_lock handling.\n  niu: Use pci_ioremap_bar().\n  bnx2x: Version Update\n  bnx2x: Calling netif_carrier_off at the end of the probe\n  bnx2x: PCI configuration bug on big-endian\n  bnx2x: Removing the PMF indication when unloading\n  mv643xx_eth: fix SMI bus access timeouts\n  net: kconfig cleanup\n  fs_enet: fix polling\n  XFRM: copy_to_user_kmaddress() reports local address twice\n  SMC91x: Fix compilation on some platforms.\n  udp: Fix the SNMP counter of UDP_MIB_INERRORS\n  udp: Fix the SNMP counter of UDP_MIB_INDATAGRAMS\n  drivers/net/smc911x.c: Fix lockdep warning on xmit.\n"
    },
    {
      "commit": "bbb770e7ab9a436752babfc8765e422d7481be1f",
      "tree": "ed0531a408dd7889912b9c8d2db71c973f021529",
      "parents": [
        "19ecb6ba800765743bb4525c66562f0d30993f8d"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Mon Nov 03 19:11:29 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 03 19:11:29 2008 -0800"
      },
      "message": "xfrm: Fix xfrm_policy_gc_lock handling.\n\nFrom: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\n\nBased upon a lockdep trace by Simon Arlott.\n\nxfrm_policy_kill() can be called from both BH and\nnon-BH contexts, so we have to grab xfrm_policy_gc_lock\nwith BH disabling.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a1caa32295d67284ecba18cd8db692c7166f0706",
      "tree": "12e0d6f514b665ab3b96c5235c91fe1f4d61a65e",
      "parents": [
        "55c8eb6c8eaa5009eed1557b296da5d4ea9c369a"
      ],
      "author": {
        "name": "Arnaud Ebalard",
        "email": "arno@natisbad.org",
        "time": "Mon Nov 03 01:30:23 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 03 01:30:23 2008 -0800"
      },
      "message": "XFRM: copy_to_user_kmaddress() reports local address twice\n\nWhile adding support for MIGRATE/KMADDRESS in strongSwan (as specified\nin draft-ebalard-mext-pfkey-enhanced-migrate-00), Andreas Steffen\nnoticed that XFRMA_KMADDRESS attribute passed to userland contains the\nlocal address twice (remote provides local address instead of remote\none).\n\nThis bug in copy_to_user_kmaddress() affects only key managers that use\nnative XFRM interface (key managers that use PF_KEY are not affected).\n\nFor the record, the bug was in the initial changeset I posted which\nadded support for KMADDRESS (13c1d18931ebb5cf407cb348ef2cd6284d68902d\n\u0027xfrm: MIGRATE enhancements (draft-ebalard-mext-pfkey-enhanced-migrate)\u0027).\n\nSigned-off-by: Arnaud Ebalard \u003carno@natisbad.org\u003e\nReported-by: Andreas Steffen \u003candreas.steffen@strongswan.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0856f93958c488f0cc656be53c26dfd20663bdb3",
      "tree": "bba86ff48a9eef920fafde53127f7a3f5fc67bd1",
      "parents": [
        "f26ba1751145edbf52b2c89a40e389f2fbdfc1af"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Sun Nov 02 16:14:27 2008 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Nov 02 23:52:46 2008 -0800"
      },
      "message": "udp: Fix the SNMP counter of UDP_MIB_INERRORS\n\nUDP packets received in udpv6_recvmsg() are not only IPv6 UDP packets, but\nalso have IPv4 UDP packets, so when do the counter of UDP_MIB_INERRORS in\nudpv6_recvmsg(), we should check whether the packet is a IPv6 UDP packet\nor a IPv4 UDP packet.\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f26ba1751145edbf52b2c89a40e389f2fbdfc1af",
      "tree": "abb81ca460a07a99852f9c579d4c3324faacc801",
      "parents": [
        "70d9d15833864e7120c3ffcfdbd6fa61f5f9726a"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Sun Nov 02 16:11:01 2008 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Nov 02 23:52:45 2008 -0800"
      },
      "message": "udp: Fix the SNMP counter of UDP_MIB_INDATAGRAMS\n\nIf UDP echo is sent to xinetd/echo-dgram, the UDP reply will be received\nat the sender. But the SNMP counter of UDP_MIB_INDATAGRAMS will be not\nincreased, UDP6_MIB_INDATAGRAMS will be increased instead.\n\n  Endpoint A                      Endpoint B\n  UDP Echo request -----------\u003e\n  (IPv4, Dst port\u003d7)\n                   \u003c----------    UDP Echo Reply\n                                  (IPv4, Src port\u003d7)\n\nThis bug is come from this patch cb75994ec311b2cd50e5205efdcc0696abd6675d.\n\nIt do counter UDP[6]_MIB_INDATAGRAMS until udp[v6]_recvmsg. Because\nxinetd used IPv6 socket to receive UDP messages, thus, when received\nUDP packet, the UDP6_MIB_INDATAGRAMS will be increased in function\nudpv6_recvmsg() even if the packet is a IPv4 UDP packet.\n\nThis patch fixed the problem.\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "391e572cd1a63aee9c8d4c2d5e3dada91d86bc43",
      "tree": "b89d924e644a7e66cd2b63d978607c6d0d3e7285",
      "parents": [
        "4ac96572f1f6abe44b5e02e80fdfb5a990129613",
        "48dcc33e5e11de0f76b65b113988dbc930d17395"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sun Nov 02 10:15:52 2008 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sun Nov 02 10:15:52 2008 -0800"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (33 commits)\n  af_unix: netns: fix problem of return value\n  IRDA: remove double inclusion of module.h\n  udp: multicast packets need to check namespace\n  net: add documentation for skb recycling\n  key: fix setkey(8) policy set breakage\n  bpa10x: free sk_buff with kfree_skb\n  xfrm: do not leak ESRCH to user space\n  net: Really remove all of LOOPBACK_TSO code.\n  netfilter: nf_conntrack_proto_gre: switch to register_pernet_gen_subsys()\n  netns: add register_pernet_gen_subsys/unregister_pernet_gen_subsys\n  net: delete excess kernel-doc notation\n  pppoe: Fix socket leak.\n  gianfar: Don\u0027t reset TBI\u003c-\u003eSerDes link if it\u0027s already up\n  gianfar: Fix race in TBI/SerDes configuration\n  at91_ether: request/free GPIO for PHY interrupt\n  amd8111e: fix dma_free_coherent context\n  atl1: fix vlan tag regression\n  SMC91x: delete unused local variable \"lp\"\n  myri10ge: fix stop/go mmio ordering\n  bonding: fix panic when taking bond interface down before removing module\n  ...\n"
    },
    {
      "commit": "48dcc33e5e11de0f76b65b113988dbc930d17395",
      "tree": "5d541fc8c41d8bf9758f3ecec721f4a4b432d786",
      "parents": [
        "abdd5a0301a6306d6465ceca9de8e732b2fedaa5"
      ],
      "author": {
        "name": "Jianjun Kong",
        "email": "jianjun@zeuux.org",
        "time": "Sat Nov 01 21:37:27 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Nov 01 21:37:27 2008 -0700"
      },
      "message": "af_unix: netns: fix problem of return value\n\nfix problem of return value\n\nnet/unix/af_unix.c: unix_net_init()\nwhen error appears, it should return \u0027error\u0027, not always return 0.\n\nSigned-off-by: Jianjun Kong \u003cjianjun@zeuux.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "920a46115ca3fa88990276d98520abab85495b2d",
      "tree": "a0960e925f2426da9766acfed2dbee144f30299c",
      "parents": [
        "d1a203eac0ec13cd1c0ba610fe7a55c9bc40473b"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Sat Nov 01 21:22:23 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Nov 01 21:22:23 2008 -0700"
      },
      "message": "udp: multicast packets need to check namespace\n\nCurrent UDP multicast delivery is not namespace aware.\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nAcked-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d1a203eac0ec13cd1c0ba610fe7a55c9bc40473b",
      "tree": "38fcd14da889f021d18346c5f3595591b5051f83",
      "parents": [
        "920da6923cf03c8a78fbaffa408f8ab37f6abfc1"
      ],
      "author": {
        "name": "Stephen Hemminger",
        "email": "shemminger@vyatta.com",
        "time": "Sat Nov 01 21:01:09 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Nov 01 21:01:09 2008 -0700"
      },
      "message": "net: add documentation for skb recycling\n\nCommit 04a4bb55bcf35b63d40fd2725e58599ff8310dd7 (\"net: add\nskb_recycle_check() to enable netdriver skb recycling\") added a\nmethod for network drivers to recycle skbuffs, but while use of\nthis mechanism was documented in the commit message, it should\nreally have been added as a docbook comment as well -- this\npatch does that.\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: Lennert Buytenhek \u003cbuytenh@marvell.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "233e70f4228e78eb2f80dc6650f65d3ae3dbf17c",
      "tree": "4e18fbe1851e6d2161b7f18265cb21f8a61e3ce7",
      "parents": [
        "3318a386e4ca68c76e0294363d29bdc46fcad670"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@ZenIV.linux.org.uk",
        "time": "Fri Oct 31 23:28:30 2008 +0000"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sat Nov 01 09:49:46 2008 -0700"
      },
      "message": "saner FASYNC handling on file close\n\nAs it is, all instances of -\u003erelease() for files that have -\u003efasync()\nneed to remember to evict file from fasync lists; forgetting that\ncreates a hole and we actually have a bunch that *does* forget.\n\nSo let\u0027s keep our lives simple - let __fput() check FASYNC in\nfile-\u003ef_flags and call -\u003efasync() there if it\u0027s been set.  And lose that\ncrap in -\u003erelease() instances - leaving it there is still valid, but we\ndon\u0027t have to bother anymore.\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "920da6923cf03c8a78fbaffa408f8ab37f6abfc1",
      "tree": "40b5c407d15f46920f1a66b6da5312654230ca4c",
      "parents": [
        "cbafe312ef4a263e9aa36786bc67e1e6d959872b"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Fri Oct 31 16:41:26 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Oct 31 16:41:26 2008 -0700"
      },
      "message": "key: fix setkey(8) policy set breakage\n\nSteps to reproduce:\n\n\t#/usr/sbin/setkey -f\n\tflush;\n\tspdflush;\n\n\tadd 192.168.0.42 192.168.0.1 ah 24500 -A hmac-md5 \"1234567890123456\";\n\tadd 192.168.0.42 192.168.0.1 esp 24501 -E 3des-cbc \"123456789012123456789012\";\n\n\tspdadd 192.168.0.42 192.168.0.1 any -P out ipsec\n\t\tesp/transport//require\n\t\tah/transport//require;\n\nsetkey: invalid keymsg length\n\nPolicy dump will bail out with the same message after that.\n\n-recv(4, \"\\2\\16\\0\\0\\32\\0\\3\\0\\0\\0\\0\\0\\37\\r\\0\\0\\3\\0\\5\\0\\377 \\0\\0\\2\\0\\0\\0\\300\\250\\0*\\0\"..., 32768, 0) \u003d 208\n+recv(4, \"\\2\\16\\0\\0\\36\\0\\3\\0\\0\\0\\0\\0H\\t\\0\\0\\3\\0\\5\\0\\377 \\0\\0\\2\\0\\0\\0\\300\\250\\0*\\0\"..., 32768, 0) \u003d 208\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a432226614c5616e3cfd211e0acffa0acfb4770c",
      "tree": "2189d97e001e8ad9173ec40c27f6a28ab109db2f",
      "parents": [
        "3a8af722495469e9c550386b910c5b93c91cf107"
      ],
      "author": {
        "name": "fernando@oss.ntt.co",
        "email": "fernando@oss.ntt.co",
        "time": "Thu Oct 23 04:27:19 2008 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Oct 31 00:06:03 2008 -0700"
      },
      "message": "xfrm: do not leak ESRCH to user space\n\nI noticed that, under certain conditions, ESRCH can be leaked from the\nxfrm layer to user space through sys_connect. In particular, this seems\nto happen reliably when the kernel fails to resolve a template either\nbecause the AF_KEY receive buffer being used by racoon is full or\nbecause the SA entry we are trying to use is in XFRM_STATE_EXPIRED\nstate.\n\nHowever, since this could be a transient issue it could be argued that\nEAGAIN would be more appropriate. Besides this error code is not even\ndocumented in the man page for sys_connect (as of man-pages 3.07).\n\nSigned-off-by: Fernando Luis Vazquez Cao \u003cfernando@oss.ntt.co.jp\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e5e7ad44d05d3f8227a10a17761505fce2c08e38",
      "tree": "2417654b9fbc2f709a1c8990894c2712a8d671e1",
      "parents": [
        "61e5744849cb936bf4361181b8f9ebccebf4d9db",
        "47b676c0e03dcfd88de91f6f24a06653cfdf32af"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 30 23:57:40 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 30 23:57:40 2008 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.infradead.org/users/pcmoore/lblnet-2.6\n"
    },
    {
      "commit": "61e5744849cb936bf4361181b8f9ebccebf4d9db",
      "tree": "ede29906dfefdce4f1ad4f07fc18f1276cad62bd",
      "parents": [
        "485ac57bc1238719b1508f91b0f9eeda4a3c84bb"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Thu Oct 30 23:55:44 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 30 23:55:44 2008 -0700"
      },
      "message": "netfilter: nf_conntrack_proto_gre: switch to register_pernet_gen_subsys()\n\nregister_pernet_gen_device() can\u0027t be used is nf_conntrack_pptp module is\nalso used (compiled in or loaded).\n\nRight now, proto_gre_net_exit() is called before nf_conntrack_pptp_net_exit().\nThe former shutdowns and frees GRE piece of netns, however the latter\nabsolutely needs it to flush keymap. Oops is inevitable.\n\nSwitch to shiny new register_pernet_gen_subsys() to get correct ordering in\nnetns ops list.\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "485ac57bc1238719b1508f91b0f9eeda4a3c84bb",
      "tree": "daa4c6fde9255c7d3a2a1add5c8c78b418d5e81e",
      "parents": [
        "ad1d967c88e349c7e822ad75dd3247a2a50d2ea3"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Thu Oct 30 23:55:16 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 30 23:55:16 2008 -0700"
      },
      "message": "netns: add register_pernet_gen_subsys/unregister_pernet_gen_subsys\n\nnetns ops which are registered with register_pernet_gen_device() are\nshutdown strictly before those which are registered with\nregister_pernet_subsys(). Sometimes this leads to opposite (read: buggy)\nshutdown ordering between two modules.\n\nAdd register_pernet_gen_subsys()/unregister_pernet_gen_subsys() for modules\nwhich aren\u0027t elite enough for entry in struct net, and which can\u0027t use\nregister_pernet_gen_device(). PPTP conntracking module is such one.\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1b2d3d94ec878c3529153061cd8cceb876e01a3e",
      "tree": "93adaf1666942024cce4e3aa0bc58f0f1095bd2f",
      "parents": [
        "8bd93ca7b03f38a7bc1a4ed9e93e8c006e753d5b",
        "5f707eb429e2c98dfd564ffbbd9f536bf493d869"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Oct 30 12:51:42 2008 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Oct 30 12:51:42 2008 -0700"
      },
      "message": "Merge branch \u0027bugfixes\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6\n\n* \u0027bugfixes\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6:\n  SUNRPC: Fix potential race in put_rpccred()\n  SUNRPC: Fix rpcauth_prune_expired\n  NFS: Convert nfs_attr_generation_counter into an atomic_long\n  SUNRPC: Respond promptly to server TCP resets\n"
    },
    {
      "commit": "47b676c0e03dcfd88de91f6f24a06653cfdf32af",
      "tree": "30c7400d784109845af731891ff22fc10461c9bb",
      "parents": [
        "f8a024796b2bbec3d1a4ad5aae6173cfb18226b4"
      ],
      "author": {
        "name": "Manish Katiyar",
        "email": "mkatiyar@gmail.com",
        "time": "Thu Oct 30 10:44:48 2008 -0400"
      },
      "committer": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Thu Oct 30 10:44:48 2008 -0400"
      },
      "message": "netlabel: Fix compilation warnings in net/netlabel/netlabel_addrlist.c\n\nEnable netlabel auditing functions only when CONFIG_AUDIT is set\n\nSigned-off-by: Manish Katiyar \u003cmkatiyar@gmail.com\u003e\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\n"
    },
    {
      "commit": "f8a024796b2bbec3d1a4ad5aae6173cfb18226b4",
      "tree": "f4695adfeeef323569f2e9a47186594bc02336be",
      "parents": [
        "00af5c69598212cf6cd4ecb4ca89785118aeecad"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Wed Oct 29 16:09:12 2008 -0400"
      },
      "committer": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Wed Oct 29 16:09:12 2008 -0400"
      },
      "message": "netlabel: Fix compiler warnings in netlabel_mgmt.c\n\nFix the compiler warnings below, thanks to Andrew Morton for finding them.\n\n net/netlabel/netlabel_mgmt.c: In function `netlbl_mgmt_listentry\u0027:\n net/netlabel/netlabel_mgmt.c:268: warning: \u0027ret_val\u0027 might be used\n  uninitialized in this function\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\n"
    },
    {
      "commit": "00af5c69598212cf6cd4ecb4ca89785118aeecad",
      "tree": "5e5039bb3083046680aa542f242f1eda6658028a",
      "parents": [
        "e946217e4fdaa67681bbabfa8e6b18641921f750"
      ],
      "author": {
        "name": "roel kluin",
        "email": "roel.kluin@gmail.com",
        "time": "Wed Oct 29 15:55:53 2008 -0400"
      },
      "committer": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Wed Oct 29 15:55:53 2008 -0400"
      },
      "message": "cipso: unsigned buf_len cannot be negative\n\nunsigned buf_len cannot be negative\n\nSigned-off-by: Roel Kluin \u003croel.kluin@gmail.com\u003e\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\n"
    }
  ],
  "next": "882716604ecf388b2ff09bc76eb2a752aa9cc76b"
}
