)]}'
{
  "log": [
    {
      "commit": "c63a1190368771b8207d86c4217ae4afdf1cbd5e",
      "tree": "b92409d027dbb1fdef33242b964d0105fc4ef4ad",
      "parents": [
        "ededa4d396b15c282aa60d6aacddfc07f0142dbf",
        "8085106a58366fb2c6c14d89e3d4395d2702d4a1"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@woody.linux-foundation.org",
        "time": "Mon Dec 17 19:29:41 2007 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@woody.linux-foundation.org",
        "time": "Mon Dec 17 19:29:41 2007 -0800"
      },
      "message": "Merge branch \u0027upstream-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/jgarzik/netdev-2.6\n\n* \u0027upstream-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/jgarzik/netdev-2.6: (23 commits)\n  iwlwifi: fix rf_kill state inconsistent during suspend and resume\n  b43: Fix rfkill radio LED\n  bcm43xx_debugfs sscanf fix\n  libertas: select WIRELESS_EXT\n  iwlwifi3945/4965: fix rate control algo reference leak\n  ieee80211_rate: missed unlock\n  wireless/ipw2200.c: add __dev{init,exit} annotations\n  zd1211rw: Fix alignment problems\n  libertas: add Dan Williams as maintainer\n  sis190 endianness\n  ucc_geth: really fix section mismatch\n  pcnet_cs: add new id\n  ixgb: make sure jumbos stay enabled after reset\n  Net: ibm_newemac, remove SPIN_LOCK_UNLOCKED\n  net: smc911x: shut up compiler warnings\n  ucc_geth: minor whitespace fix\n  drivers/net/s2io.c section fixes\n  drivers/net/sis190.c section fix\n  hamachi endianness fixes\n  e100: free IRQ to remove warningwhenrebooting\n  ...\n"
    },
    {
      "commit": "8085106a58366fb2c6c14d89e3d4395d2702d4a1",
      "tree": "9c349f8ad0d6536cfd16f046776d9c8a71c81c21",
      "parents": [
        "961994a0c2a24d9622eea7144b30ac773169659f",
        "53e490936a91940a153e231c3b8288e3ecfcc5aa"
      ],
      "author": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Mon Dec 17 18:05:43 2007 -0500"
      },
      "committer": {
        "name": "Jeff Garzik",
        "email": "jeff@garzik.org",
        "time": "Mon Dec 17 18:05:43 2007 -0500"
      },
      "message": "Merge branch \u0027fixes-jgarzik\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6 into upstream-fixes\n"
    },
    {
      "commit": "b808ab16a9c99c00e3d8c3b351977fce62781dd0",
      "tree": "7005de517244926a3aac5f18a4df38f80063839c",
      "parents": [
        "2ef19e63e698d740661e04bd6d62ac3305435c61"
      ],
      "author": {
        "name": "Cyrill Gorcunov",
        "email": "gorcunov@gmail.com",
        "time": "Thu Dec 13 15:52:11 2007 -0800"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Dec 17 17:01:39 2007 -0500"
      },
      "message": "ieee80211_rate: missed unlock\n\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "2cc3a8f6ac0fb1e6095a47001d31aadcf9722bde",
      "tree": "afcc572acff2548cdabdfb0ec488508e1864daf1",
      "parents": [
        "23afc5c67588c92a062b4828a97b119755dffb51",
        "78f5815368837ae7e3a0d3709c9f95f74e4d8537"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@woody.linux-foundation.org",
        "time": "Mon Dec 17 13:36:17 2007 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@woody.linux-foundation.org",
        "time": "Mon Dec 17 13:36:17 2007 -0800"
      },
      "message": "Merge git://git.linux-nfs.org/pub/linux/nfs-2.6\n\n* git://git.linux-nfs.org/pub/linux/nfs-2.6:\n  MAINTAINERS: update the NFS CLIENT entry\n  NFS: Fix an Oops in NFS unmount\n  Revert \"NFS: Ensure we return zero if applications attempt to write zero bytes\"\n  SUNRPC xprtrdma: fix XDR tail buf marshalling for all ops\n  NFSv2/v3: Fix a memory leak when using -onolock\n  NFS: Fix NFS mountpoint crossing...\n"
    },
    {
      "commit": "a26e01d71622a4cecad06ce85bcab3ed878e7f83",
      "tree": "3f5542ffbfa3daad4bd4715a6c45a9ea2257ff08",
      "parents": [
        "ea332912b8a2e0b2f51ac3b6c197b71d3a18cbb7"
      ],
      "author": {
        "name": "Richard Knutsson",
        "email": "ricknu-0@student.ltu.se",
        "time": "Sun Dec 16 14:10:33 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Dec 16 14:10:33 2007 -0800"
      },
      "message": "[IRDA]: irda parameters warning fixes.\n\nThis patch fixes:\n  CHECK   /home/kernel/src/net/irda/parameters.c\n/home/kernel/src/net/irda/parameters.c:466:2: warning: Using plain integer as NULL pointer\n/home/kernel/src/net/irda/parameters.c:520:2: warning: Using plain integer as NULL pointer\n/home/kernel/src/net/irda/parameters.c:573:2: warning: Using plain integer as NULL pointer\n\nSigned-off-by: Richard Knutsson \u003cricknu-0@student.ltu.se\u003e\nSigned-off-by: Samuel Ortiz \u003csamuel@sortiz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2638698df30b7b57a8dad7029a0c89fe6c4f6783",
      "tree": "add1ff233d0639746c13918867dede1bdaa1c81d",
      "parents": [
        "0ff804348d66550e7dd1d6781c65403b312e2da2"
      ],
      "author": {
        "name": "Hinko Kocevar",
        "email": "hinko.kocevar@cetrtapot.si",
        "time": "Sun Dec 16 14:08:58 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Dec 16 14:08:58 2007 -0800"
      },
      "message": "[IRDA]: irlmp_unregister_link() needs to free lsaps.\n\nWhile testing the mcs7780 based IrDA USB dongle I\u0027ve stumbled upon\nmemory leak in irlmp_unregister_link(). Hashbin for lsaps is created in\nirlmp_register_link and should probably be freed in irlmp_unregister_link().\n\nSigned-off-by: Hinko Kocevar \u003chinko.kocevar@cetrtapot.si\u003e\nSigned-off-by: Samuel Ortiz \u003csamuel@sortiz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ef5d4cf2f9aae4e09883d2d664e367a16b47d857",
      "tree": "b6e83cf4f8b975c8bec0045c8a74d11496524f10",
      "parents": [
        "215f7b08f2a142ec19f4bd3d6de263e68b877955"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Sun Dec 16 14:05:45 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Dec 16 14:05:45 2007 -0800"
      },
      "message": "[SCTP]: Flush fragment queue when exiting partial delivery.\n\nAt the end of partial delivery, we may have complete messages\nsitting on the fragment queue.  These messages are stuck there\nuntil a new fragment arrives.  This can comletely stall a\ngiven association.  When clearing partial delivery state, flush\nany complete messages from the fragment queue and send them on\ntheir way up.\n\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "215f7b08f2a142ec19f4bd3d6de263e68b877955",
      "tree": "a2f5857336b427d3e47310da2328b4b11fc8ca92",
      "parents": [
        "488faa2ae32c2f8b1ffda5c7fae5eb7c979acc15"
      ],
      "author": {
        "name": "Jarek Poplawski",
        "email": "jarkao2@gmail.com",
        "time": "Sun Dec 16 14:02:07 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Dec 16 14:02:07 2007 -0800"
      },
      "message": "[AX25]: Locking dependencies fix in ax25_disconnect().\n\nBernard Pidoux reported these lockdep warnings:\n\n[ INFO: possible irq lock inversion dependency detected ]\n2.6.23.1 #1\n---------------------------------------------------------\nfpac/4933 just changed the state of lock:\n (slock-AF_AX25){--..}, at: [\u003cd8be3312\u003e] ax25_disconnect+0x46/0xaf\n [ax25]\n but this lock was taken by another, soft-irq-safe lock in the past:\n  (ax25_list_lock){-+..}\n\n  and interrupts could create inverse lock ordering between them.\n  [...]\n\n[ INFO: inconsistent lock state ]\n2.6.23.1 #1\n---------------------------------\ninconsistent {in-softirq-W} -\u003e {softirq-on-W} usage.\nax25_call/4005 [HC0[0]:SC0[0]:HE1:SE1] takes:\n (slock-AF_AX25){-+..}, at: [\u003cd8b79312\u003e] ax25_disconnect+0x46/0xaf [ax25]\n [...]\n\nThis means slock-AF_AX25 could be taken both from softirq and process\ncontext with softirqs enabled, so it\u0027s endangered itself, but also makes\nax25_list_lock vulnerable. It was not 100% verified if the real lockup\ncan happen, but this fix isn\u0027t very costly and looks safe anyway.\n(It was tested by Bernard with 2.6.23.9 and 2.6.24-rc5 kernels.)\n\n\nReported_by: Bernard Pidoux \u003cpidoux@ccr.jussieu.fr\u003e\nTested_by: Bernard Pidoux \u003cpidoux@ccr.jussieu.fr\u003e\nSigned-off-by: Jarek Poplawski \u003cjarkao2@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "488faa2ae32c2f8b1ffda5c7fae5eb7c979acc15",
      "tree": "6e8eca37bbfd76d9c7875df6c5016c57dae316dd",
      "parents": [
        "cf6fc4a92400decda932e5ab97b46916919142b1"
      ],
      "author": {
        "name": "Satoru SATOH",
        "email": "satoru.satoh@gmail.com",
        "time": "Sun Dec 16 14:00:19 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Dec 16 14:00:19 2007 -0800"
      },
      "message": "[IPV4]: Make tcp_input_metrics() get minimum RTO via tcp_rto_min()\n\ntcp_input_metrics() refers to the built-time constant TCP_RTO_MIN\nregardless of configured minimum RTO with iproute2.\n\nSigned-off-by: Satoru SATOH \u003csatoru.satoh@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cf6fc4a92400decda932e5ab97b46916919142b1",
      "tree": "c2586cf2d1f2261533696607ff67925cab26853b",
      "parents": [
        "3ae412544cde6d987e0e48778bd87bc96a5749df"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Sun Dec 16 13:39:57 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Dec 16 13:39:57 2007 -0800"
      },
      "message": "[IPV6]: Fix the return value of ipv6_getsockopt\n\nIf CONFIG_NETFILTER if not selected when compile the kernel source code, \nipv6_getsockopt will returen an EINVAL error if optname is not supported by\nthe kernel. But if CONFIG_NETFILTER is selected, ENOPROTOOPT error will \nbe return.\n\nThis patch fix to always return ENOPROTOOPT error if optname argument of \nipv6_getsockopt is not supported by the kernel.\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3ae412544cde6d987e0e48778bd87bc96a5749df",
      "tree": "c0f62a4781edbc00d4da5480a4608784461715fa",
      "parents": [
        "f33e1d9fa20381afa3be7e7f560c59845bfa5cec"
      ],
      "author": {
        "name": "Stephen Hemminger",
        "email": "shemminger@linux-foundation.org",
        "time": "Sun Dec 16 13:35:51 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Dec 16 13:35:51 2007 -0800"
      },
      "message": "[BRIDGE]: Assign random address.\n\nAssigning a valid random address to bridge device solves problems\nwhen bridge device is brought up before adding real device to bridge.\nWhen the first real device is added to the bridge, it\u0027s address\nwill overide the bridges random address.\n\nNote: any device added to a bridge must already have a valid\nethernet address.\n br_add_if -\u003e br_fdb_insert -\u003e fdb_insert -\u003e is_valid_ether_addr\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@linux-foundation.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f33e1d9fa20381afa3be7e7f560c59845bfa5cec",
      "tree": "4de2973e4f53cc8d10da205810e757ad0b998a40",
      "parents": [
        "f58adb757be48068e2bded3dd77ba072c22a10ff"
      ],
      "author": {
        "name": "Amos Waterland",
        "email": "apw@us.ibm.com",
        "time": "Fri Dec 14 11:30:22 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 14 13:54:40 2007 -0800"
      },
      "message": "[IPV4]: Updates to nfsroot documentation\n\nThe difference between ip\u003doff and ip\u003d::::::off has been a cause of much\nconfusion.  Document how each behaves, and do not contradict ourselves by\nsaying that \"off\" is the default when in fact \"any\" is the default and is\ndescibed as being so lower in the file.\n\nSigned-off-by: Amos Waterland \u003capw@us.ibm.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "98eb5683fb94c458b3c8d121797bc9aa1baf4e7e",
      "tree": "d572e7ef5654905072dd3a0e6017ec67785a4486",
      "parents": [
        "cbebc51f7b77d26ec23145d6ef22ac2b209f7955"
      ],
      "author": {
        "name": "Andrew Morton",
        "email": "akpm@linux-foundation.org",
        "time": "Wed Dec 12 11:24:19 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 14 13:54:37 2007 -0800"
      },
      "message": "[TIPC]: Fix semaphore handling.\n\nAs noted by Kevin, tipc\u0027s release() does down_interruptible() and\nignores the return value.  So if signal_pending() we\u0027ll end up doing\nup() on a non-downed semaphore.  Fix.\n\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cbebc51f7b77d26ec23145d6ef22ac2b209f7955",
      "tree": "ddbe440a884612cf1c957602749fb8994b1c3e87",
      "parents": [
        "9ab4c954ce2b2b3c485bee7e425fda05946893be"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Wed Dec 12 11:11:28 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 14 13:54:36 2007 -0800"
      },
      "message": "[NETFILTER]: xt_hashlimit should use time_after_eq()\n\nIn order to avoid jiffies wraparound and its effect, special care must\nbe taken\nwhen doing comparisons ...\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nAcked-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9ab4c954ce2b2b3c485bee7e425fda05946893be",
      "tree": "111c1cd3b765d06fd42325b1904a2289297142a8",
      "parents": [
        "a18aa31b7774d8b36048e256a02d9d689533fc96"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Wed Dec 12 11:10:16 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 14 13:54:35 2007 -0800"
      },
      "message": "[XFRM]: Display the audited SPI value in host byte order.\n\nCurrently the IPsec protocol SPI values are written to the audit log in\nnetwork byte order which is different from almost all other values which\nare recorded in host byte order.  This patch corrects this inconsistency\nby writing the SPI values to the audit record in host byte order.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a18aa31b7774d8b36048e256a02d9d689533fc96",
      "tree": "095e8f12e838b819961adea85738c0a6e72048a9",
      "parents": [
        "f2a89004da23a5ed2d78ac5550ccda5b714fe7d0"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Dec 12 10:35:16 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 14 13:54:35 2007 -0800"
      },
      "message": "[NETFILTER]: ip_tables: fix compat copy race\n\nWhen copying entries to user, the kernel makes two passes through the\ndata, first copying all the entries, then fixing up names and counters.\nOn the second pass it copies the kernel and match data from userspace\nto the kernel again to find the corresponding structures, expecting\nthat kernel pointers contained in the data are still valid.\n\nThis is obviously broken, fix by avoiding the second pass completely\nand fixing names and counters while dumping the ruleset, using the\nkernel-internal data structures.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f2a89004da23a5ed2d78ac5550ccda5b714fe7d0",
      "tree": "71b945c3364b92103d66109880f60d32868fdc8a",
      "parents": [
        "da8cadb31b82c9d41fc593c8deab6aa20b162d6b"
      ],
      "author": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Wed Dec 12 10:34:29 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 14 13:54:33 2007 -0800"
      },
      "message": "[NETFILTER]: ctnetlink: set expected bit for related conntracks\n\nThis patch is a fix. It sets IPS_EXPECTED for related conntracks.\n\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "50e1092b3a119bb4660bb6bd2e1749dc2d8ac62e",
      "tree": "68278271b9dc445ad9d2f2b0475930968c8568fc",
      "parents": [
        "5cef338b30c110daf547fb13d99f0c77f2a79fbc"
      ],
      "author": {
        "name": "James Lentini",
        "email": "jlentini@netapp.com",
        "time": "Mon Dec 10 11:24:48 2007 -0500"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Tue Dec 11 22:01:59 2007 -0500"
      },
      "message": "SUNRPC xprtrdma: fix XDR tail buf marshalling for all ops\n\nrpcrdma_convert_iovs is passed an xdr_buf representing either an RPC\nrequest or an RPC reply. In the case of a request, several\ncalculations and tests involving pos are unnecessary. In the case of a\nreply, several calculations and tests involving pos are incorrect (the\ncode tests pos against the reply xdr buf\u0027s len field, which is always\n0 at the time rpcrdma_convert_iovs is executed). This change removes\nthe incorrect/unnecessary calculations and tests involving pos.\n\nThis fixes an observed problem when reading certain file sizes over\nNFS/RDMA.\n\nSigned-off-by: Tom Tucker \u003ctom@opengridcomputing.com\u003e\nSigned-off-by: Tom Talpey \u003ctalpey@netapp.com\u003e\nSigned-off-by: James Lentini \u003cjlentini@netapp.com\u003e\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\n"
    },
    {
      "commit": "75b8c133267053c9986a7c8db5131f0e7349e806",
      "tree": "264a44a1882196c894f1af84baf7fbba7698678c",
      "parents": [
        "3f03e387893ffa07a4d5dac96772f9db3221a185"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Dec 11 04:38:08 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Dec 11 04:38:08 2007 -0800"
      },
      "message": "[IPSEC]: Fix potential dst leak in xfrm_lookup\n\nIf we get an error during the actual policy lookup we don\u0027t free the\noriginal dst while the caller expects us to always free the original\ndst in case of error.\n\nThis patch fixes that.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3f03e387893ffa07a4d5dac96772f9db3221a185",
      "tree": "0b9296bdf891f0d7a8dec09d113a986cebac989f",
      "parents": [
        "d59b54b150b3b69b721f1e161efd42ecb7619897"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Tue Dec 11 02:41:25 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Dec 11 02:45:32 2007 -0800"
      },
      "message": "[VLAN]: Fix potential race in vlan_cleanup_module vs vlan_ioctl_handler.\n\nThe vlan module cleanup function starts with\n\n\tvlan_netlink_fini();\n\tvlan_ioctl_set(NULL);\n\nThe first call removes all the vlan devices and\nthe second one closes the vlan ioctl.\n\nAFAIS there\u0027s a tiny race window between these two\ncalls - after rtnl unregistered all the vlans, but\nthe ioctl handler isn\u0027t set to NULL yet, user can\nmanage to call this ioctl and create one vlan device,\nand that this function will later BUG_ON seeing\nnon-emply hashes.\n\nI think, that we must first close the vlan ioctl\nand only after this remove all the vlans with the\nvlan_netlink_fini() call.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nAcked-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d59b54b150b3b69b721f1e161efd42ecb7619897",
      "tree": "04be0d418ac06d1c658e16fc4e2527d5e48fb6d7",
      "parents": [
        "bbe42974215eb7a483c344fca50652b3b9dd1ae4"
      ],
      "author": {
        "name": "Wang Chen",
        "email": "wangchen@cn.fujitsu.com",
        "time": "Tue Dec 11 02:28:03 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Dec 11 02:45:32 2007 -0800"
      },
      "message": "[NET]: Fix wrong comments for unregister_net*\n\nThere are some return value comments for void functions.\nFixed it.\n\nSigned-off-by: Wang Chen \u003cwangchen@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "95a02cfd4d33886c166d4a5f309120f8d32ced58",
      "tree": "cae6142cca5d521db3f6471321cf31903eb2f7ba",
      "parents": [
        "2017a72c070033830b460d31cd4703f9d2ec0d56"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Mon Dec 10 16:53:29 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Dec 11 02:45:27 2007 -0800"
      },
      "message": "[IPv6] ESP: Discard dummy packets introduced in rfc4303\n\nRFC4303 introduces dummy packets with a nexthdr value of 59\nto implement traffic confidentiality. Such packets need to\nbe dropped silently and the payload may not be attempted to\nbe parsed as it consists of random chunk.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2017a72c070033830b460d31cd4703f9d2ec0d56",
      "tree": "1f9b9cace02c54739fbc36430bd685ee4d0806fe",
      "parents": [
        "a4e65d36a959005f14142535b58c44cd0f1de8cb"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Mon Dec 10 16:53:05 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Dec 11 02:45:26 2007 -0800"
      },
      "message": "[IPv4] ESP: Discard dummy packets introduced in rfc4303\n\nRFC4303 introduces dummy packets with a nexthdr value of 59\nto implement traffic confidentiality. Such packets need to\nbe dropped silently and the payload may not be attempted to\nbe parsed as it consists of random chunk.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a4e65d36a959005f14142535b58c44cd0f1de8cb",
      "tree": "8f6e438dfb7e869387538bd4205c01ba05f665f1",
      "parents": [
        "1df2e44560c0d72f381126e52a3ba53614c1c484"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Fri Dec 07 23:55:43 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Dec 11 02:45:25 2007 -0800"
      },
      "message": "[IPV4]: Swap the ifa allocation with the\"ipv4_devconf_setall\" call\n\nAccording to Herbert, the ipv4_devconf_setall should be called\nonly when the ifa is added to the device. However, failed\nifa allocation may bring things into inconsistent state.\n\nMove the call to ipv4_devconf_setall after the ifa allocation.\n\nFits both net-2.6 (with offsets) and net-2.6.25 (cleanly).\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1df2e44560c0d72f381126e52a3ba53614c1c484",
      "tree": "8bc7227fac968259d641b2875adb8699fcb2a898",
      "parents": [
        "82d29bf6dc7317aeb0a3a13c2348ca8591965875"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Fri Dec 07 23:50:40 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Dec 11 02:45:24 2007 -0800"
      },
      "message": "[IPV6] XFRM: Fix auditing rt6i_flags; use RTF_xxx flags instead of RTCF_xxx.\n\nRTCF_xxx flags, defined in include/linux/in_route.h) are available for\nIPv4 route (rtable) entries only.  Use RTF_xxx flags instead, defined\nin include/linux/ipv6_route.h, for IPv6 route entries (rt6_info).\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4aa9cb320e8081fbaec0c10eb0e077c8ca4d1ad9",
      "tree": "e42c7f8f067eba0d1d8b62843516e7c42432d7a1",
      "parents": [
        "e35de02615f97b785dc6f73cba421cea06bcbd10"
      ],
      "author": {
        "name": "David Howells",
        "email": "dhowells@redhat.com",
        "time": "Fri Dec 07 04:31:47 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Dec 07 04:31:47 2007 -0800"
      },
      "message": "[AF_RXRPC]: Add a missing goto\n\nAdd a missing goto to error handling in the RXKAD security module for\nAF_RXRPC.\n\nSigned-off-by: David Howells \u003cdhowells@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e35de02615f97b785dc6f73cba421cea06bcbd10",
      "tree": "f8568278e81ad7e6176df1a7d1532076956f95a0",
      "parents": [
        "8e71a11c9f3c09a01fcb445772ffd61b140f2479"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Thu Dec 06 22:52:16 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 07 01:07:55 2007 -0800"
      },
      "message": "[VLAN]: Lost rtnl_unlock() in vlan_ioctl()\n\nThe SET_VLAN_NAME_TYPE_CMD command w/o CAP_NET_ADMIN capability\ndoesn\u0027t release the rtnl lock.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8e71a11c9f3c09a01fcb445772ffd61b140f2479",
      "tree": "a0fb2c002d472252ea060c88f8dfda6ddb23b3fc",
      "parents": [
        "f26f7c480555812ca7c4037e0a50fa54afe2cb4a"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Thu Dec 06 22:50:54 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 07 01:07:49 2007 -0800"
      },
      "message": "[SCTP]: Fix the bind_addr info during migration.\n\nDuring accept/migrate the code attempts to copy the addresses from\nthe parent endpoint to the new endpoint.   However, if the parent\nwas bound to a wildcard address, then we end up pointlessly copying\nall of the current addresses on the system.\n\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f26f7c480555812ca7c4037e0a50fa54afe2cb4a",
      "tree": "1418b99033d50241b8f866124b0974e7adb16449",
      "parents": [
        "56c99d0415e8b778c200f115b198c126243ec351"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Thu Dec 06 22:50:27 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 07 01:07:45 2007 -0800"
      },
      "message": "[SCTP]: Add bind hash locking to the migrate code\n\nSCTP accept code tries to add a newliy created socket\nto a bind bucket without holding a lock.   On a really\nbusy system, that can causes slab corruptions.\nAdd a lock around this code.\n\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "56c99d0415e8b778c200f115b198c126243ec351",
      "tree": "0e8c15e26681fbcaf5127c8238950c2c5c58a6ac",
      "parents": [
        "7f53878dc2618bf7c01e2135bd271ac01bd85dc9"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Thu Dec 06 02:19:07 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 07 01:07:38 2007 -0800"
      },
      "message": "[IPV4]: Remove prototype of ip_rt_advice\n\nip_rt_advice has been gone, so no need to keep prototype and debug message.\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7f53878dc2618bf7c01e2135bd271ac01bd85dc9",
      "tree": "9a0f0d7dcb2aba668f423b2f5392ab5ec290ec8f",
      "parents": [
        "ca46f9c834913fc5d5c196d70673375cdaba6b56"
      ],
      "author": {
        "name": "Mitsuru Chinen",
        "email": "mitch@linux.vnet.ibm.com",
        "time": "Fri Dec 07 01:07:24 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Dec 07 01:07:24 2007 -0800"
      },
      "message": "[IPv4]: Reply net unreachable ICMP message\n\nIPv4 stack doesn\u0027t reply any ICMP destination unreachable message\nwith net unreachable code when IP detagrams are being discarded\nbecause of no route could be found in the forwarding path.\nIncidentally, IPv6 stack replies such ICMPv6 message in the similar\nsituation.\n\nSigned-off-by: Mitsuru Chinen \u003cmitch@linux.vnet.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ca46f9c834913fc5d5c196d70673375cdaba6b56",
      "tree": "f073198141ef0df8bbc4d460755cead5a1b50447",
      "parents": [
        "73afc9069289bdb77cf0c81cb9775dcb63894bbe"
      ],
      "author": {
        "name": "Mitsuru Chinen",
        "email": "mitch@linux.vnet.ibm.com",
        "time": "Wed Dec 05 22:31:47 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 07 01:06:30 2007 -0800"
      },
      "message": "[IPv6] SNMP: Increment OutNoRoutes when connecting to unreachable network\n\nIPv6 stack doesn\u0027t increment OutNoRoutes counter when IP datagrams\nis being discarded because no route could be found to transmit them\nto their destination. IPv6 stack should increment the counter.\nIncidentally, IPv4 stack increments that counter in such situation.\n\nSigned-off-by: Mitsuru Chinen \u003cmitch@linux.vnet.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "73afc9069289bdb77cf0c81cb9775dcb63894bbe",
      "tree": "d4ef2100819a28fe0af9e7d0652481f578ccbe0b",
      "parents": [
        "0c3b091b9a7a5184011e75afa7f0206d288ddb06"
      ],
      "author": {
        "name": "Andrew Morton",
        "email": "akpm@linux-foundation.org",
        "time": "Wed Dec 05 21:35:23 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 07 01:05:53 2007 -0800"
      },
      "message": "[BRIDGE]: Section fix.\n\nWARNING: vmlinux.o(.init.text+0x204e2): Section mismatch: reference to .exit.text:br_fdb_fini (between \u0027br_init\u0027 and \u0027br_fdb_init\u0027)\n\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "621544eb8c3beaa859c75850f816dd9b056a00a3",
      "tree": "15c4375c8899ced48bd751eb139cfe9b3778bda9",
      "parents": [
        "4e67d876ce07471e02be571038d5435a825f0215"
      ],
      "author": {
        "name": "Andrew Gallatin",
        "email": "gallatin@myri.com",
        "time": "Wed Dec 05 02:31:42 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Dec 05 05:37:32 2007 -0800"
      },
      "message": "[LRO]: fix lro_gen_skb() alignment\n\nAdd a field to the lro_mgr struct so that drivers can specify how much\npadding is required to align layer 3 headers when a packet is copied\ninto a freshly allocated skb by inet_lro.c:lro_gen_skb().  Without\npadding, skbs generated by LRO will cause alignment warnings on\narchitectures which require strict alignment (seen on sparc64).\n\nMyri10GE is updated to use this field.\n\nSigned-off-by: Andrew Gallatin \u003cgallatin@myri.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4e67d876ce07471e02be571038d5435a825f0215",
      "tree": "99735632828d178f6dd9bc9d036b6879bcdcbebe",
      "parents": [
        "52d3408150858a301a84bcbfe2f323d90d71d2ce"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Wed Dec 05 02:25:32 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Dec 05 05:37:31 2007 -0800"
      },
      "message": "[TCP]: NAGLE_PUSH seems to be a wrong way around\n\nThe comment in tcp_nagle_test suggests that. This bug is very\nvery old, even 2.4.0 seems to have it.\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "52d3408150858a301a84bcbfe2f323d90d71d2ce",
      "tree": "275691a21b251220257fac8932f71e77dbafbbc4",
      "parents": [
        "3e6f049e0c4cf0606207c1a210abf50b436e9adf"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Wed Dec 05 02:21:35 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Dec 05 05:37:30 2007 -0800"
      },
      "message": "[TCP]: Move prior_in_flight collect to more robust place\n\nThe previous location is after sacktag processing, which affects\ncounters tcp_packets_in_flight depends on. This may manifest as\nwrong behavior if new SACK blocks are present and all is clear\nfor call to tcp_cong_avoid, which in the case of\ntcp_reno_cong_avoid bails out early because it thinks that\nTCP is not limited by cwnd.\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3e6f049e0c4cf0606207c1a210abf50b436e9adf",
      "tree": "1001162134823ffb936b0db5baf3b19a419a2e7e",
      "parents": [
        "92b05e13f16a41405c4f6c953c47b6c4bcf82d30"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Wed Dec 05 02:20:21 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Dec 05 05:37:29 2007 -0800"
      },
      "message": "[TCP] FRTO: Use of existing funcs make code more obvious \u0026 robust\n\nThough there\u0027s little need for everything that tcp_may_send_now\ndoes (actually, even the state had to be adjusted to pass some\nchecks FRTO does not want to occur), it\u0027s more robust to let it\nmake the decision if sending is allowed. State adjustments\nneeded:\n- Make sure snd_cwnd limit is not hit in there\n- Disable nagle (if necessary) through the frto_counter \u003d\u003d 2\n\nThe result of check for frto_counter in argument to call for\ntcp_enter_frto_loss can just be open coded, therefore there\nisn\u0027t need to store the previous frto_counter past\ntcp_may_send_now.\n\nIn addition, returns can then be combined.\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "92b05e13f16a41405c4f6c953c47b6c4bcf82d30",
      "tree": "338f11748f37cd13cd2cfe7f711f226732c23106",
      "parents": [
        "78f150bf94f5430fe8c34edeafe8d01706f38148"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Wed Dec 05 02:18:48 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Dec 05 05:37:28 2007 -0800"
      },
      "message": "[IRDA]: Move ircomm_tty_line_info() under #ifdef CONFIG_PROC_FS\n\nThe function in question is called only from ircomm_tty_read_proc,\nwhich is under this option. Move this helper to the same place.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "78f150bf94f5430fe8c34edeafe8d01706f38148",
      "tree": "8b192b53be1407344668c4307db6441039997226",
      "parents": [
        "4ac63ad6c52e9cdefbcb54ec4575ab12b78b49d9"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Wed Dec 05 02:18:15 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Dec 05 05:37:28 2007 -0800"
      },
      "message": "[ROSE]: Trivial compilation CONFIG_INET\u003dn case\n\nThe rose_rebuild_header() consists only of some variables in\ncase INET\u003dn, and gcc will warn us about it.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4ac63ad6c52e9cdefbcb54ec4575ab12b78b49d9",
      "tree": "e8ff9d5a9bbe01c68a95f71f1707cc24afa770d1",
      "parents": [
        "a014bc8f0f0a3a0cac4fef656f101cdfb77b71eb"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Tue Dec 04 00:45:06 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Dec 05 05:37:27 2007 -0800"
      },
      "message": "[IPVS]: Fix sched registration race when checking for name collision.\n\nThe register_ip_vs_scheduler() checks for the scheduler with the\nsame name under the read-locked __ip_vs_sched_lock, then drops,\ntakes it for writing and puts the scheduler in list.\n\nThis is racy, since we can have a race window between the lock\nbeing re-locked for writing.\n\nThe fix is to search the scheduler with the given name right under\nthe write-locked __ip_vs_sched_lock.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nAcked-by: Simon Horman \u003chorms@verge.net.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a014bc8f0f0a3a0cac4fef656f101cdfb77b71eb",
      "tree": "0b48fdff5525ddba1c64a8c0fd8c8fb6e1a9aeab",
      "parents": [
        "e3c0ac04f980750a368f7cd5f1b8d1d2cdc1f735"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Tue Dec 04 00:43:24 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Dec 05 05:37:26 2007 -0800"
      },
      "message": "[IPVS]: Don\u0027t leak sysctl tables if the scheduler registration fails.\n\nIn case we load lblc or lblcr module we can leak some sysctl\ntables if the call to register_ip_vs_scheduler() fails.\n\nI\u0027ve looked at the register_ip_vs_scheduler() code and saw, that\nthe only reason to fail is the name collision, so I think that\nwith some 3rd party schedulers this becomes a relevant issue. No?\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nAcked-by: Simon Horman \u003chorms@verge.net.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8002cedc1adbf51e2d56091534ef7551b88329b4",
      "tree": "2c65c82b2b5300eac581a0ee794d98f0b61593b6",
      "parents": [
        "e87cb5db0dc357473ac71801051954ddd6ff604f",
        "d523a328fb0271e1a763e985a21f2488fd816e7e"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@woody.linux-foundation.org",
        "time": "Mon Dec 03 08:15:36 2007 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@woody.linux-foundation.org",
        "time": "Mon Dec 03 08:15:36 2007 -0800"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/herbert/net-2.6: (27 commits)\n  [INET]: Fix inet_diag dead-lock regression\n  [NETNS]: Fix /proc/net breakage\n  [TEXTSEARCH]: Do not allow zero length patterns in the textsearch infrastructure\n  [NETFILTER]: fix forgotten module release in xt_CONNMARK and xt_CONNSECMARK\n  [NETFILTER]: xt_TCPMSS: remove network triggerable WARN_ON\n  [DECNET]: dn_nl_deladdr() almost always returns no error\n  [IPV6]: Restore IPv6 when MTU is big enough\n  [RXRPC]: Add missing select on CRYPTO\n  mac80211: rate limit wep decrypt failed messages\n  rfkill: fix double-mutex-locking\n  mac80211: drop unencrypted frames if encryption is expected\n  mac80211: Fix behavior of ieee80211_open and ieee80211_close\n  ieee80211: fix unaligned access in ieee80211_copy_snap\n  mac80211: free ifsta-\u003eextra_ie and clear IEEE80211_STA_PRIVACY_INVOKED\n  SCTP: Fix build issues with SCTP AUTH.\n  SCTP: Fix chunk acceptance when no authenticated chunks were listed.\n  SCTP: Fix the supported extensions paramter\n  SCTP: Fix SCTP-AUTH to correctly add HMACS paramter.\n  SCTP: Fix the number of HB transmissions.\n  [TCP] illinois: Incorrect beta usage\n  ...\n"
    },
    {
      "commit": "d523a328fb0271e1a763e985a21f2488fd816e7e",
      "tree": "c877f39b7719531646d7066085f1fc2af39be5ed",
      "parents": [
        "2b1e300a9dfc3196ccddf6f1d74b91b7af55e416"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Dec 03 15:51:25 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Dec 03 15:51:25 2007 +1100"
      },
      "message": "[INET]: Fix inet_diag dead-lock regression\n\nThe inet_diag register fix broke inet_diag module loading because the\nloaded module had to take the same mutex that\u0027s already held by the\nloader in order to register the new handler.\n\nThis patch fixes it by introducing a separate mutex to protect the\nhandling of handlers.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "67b4af297033f5f65999885542f95ba7b562848a",
      "tree": "fc719bd0cd194a496d05ff5e0816cbc06e9d1727",
      "parents": [
        "9dc0564e862b1b9a4677dec2c736b12169e03e99"
      ],
      "author": {
        "name": "Jan Engelhardt",
        "email": "jengelh@computergmbh.de",
        "time": "Sat Dec 01 00:01:50 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat Dec 01 00:01:50 2007 +1100"
      },
      "message": "[NETFILTER]: fix forgotten module release in xt_CONNMARK and xt_CONNSECMARK\n\nFix forgotten module release in xt_CONNMARK and xt_CONNSECMARK\n\nWhen xt_CONNMARK is used outside the mangle table and the user specified\n\"--restore-mark\", the connmark_tg_check() function will (correctly)\nerror out, but (incorrectly) forgets to release the L3 conntrack module.\nSame for xt_CONNSECMARK.\n\nFix is to move the call to acquire the L3 module after the basic\nconstraint checks.\n\nSigned-off-by: Jan Engelhardt \u003cjengelh@computergmbh.de\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "9dc0564e862b1b9a4677dec2c736b12169e03e99",
      "tree": "01e6a810f2c229bd68ac0c07778f8594481e82c5",
      "parents": [
        "3ccd86241b277249d5ac08e91eddfade47184520"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Fri Nov 30 23:58:03 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 23:58:03 2007 +1100"
      },
      "message": "[NETFILTER]: xt_TCPMSS: remove network triggerable WARN_ON\n\nipv6_skip_exthdr() returns -1 for invalid packets. don\u0027t WARN_ON\nthat.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "3ccd86241b277249d5ac08e91eddfade47184520",
      "tree": "5df95a7fd70b6064c62c7489ef5dd9a63e414853",
      "parents": [
        "d31c7b8fa303eb81311f27b80595b8d2cbeef950"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Fri Nov 30 23:43:31 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 23:43:31 2007 +1100"
      },
      "message": "[DECNET]: dn_nl_deladdr() almost always returns no error\n\nAs far as I see from the err variable initialization\nthe dn_nl_deladdr() routine was designed to report errors\nlike \"EADDRNOTAVAIL\" and probaby \"ENODEV\".\n\nBut the code sets this err to 0 after the first nlmsg_parse\nand goes on, returning this 0 in any case.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nAcked-by: Steven Whitehouse \u003cswhiteho@redhat.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "d31c7b8fa303eb81311f27b80595b8d2cbeef950",
      "tree": "171cfad23d2ee23f68c0ed89f4a1f70c0ed0db96",
      "parents": [
        "d5a784b3719ae364f49ecff12a0248f6e4252720"
      ],
      "author": {
        "name": "Evgeniy Polyakov",
        "email": "johnpol@2ka.mipt.ru",
        "time": "Fri Nov 30 23:36:08 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 23:36:08 2007 +1100"
      },
      "message": "[IPV6]: Restore IPv6 when MTU is big enough\n\nAvaid provided test application, so bug got fixed.\n\nIPv6 addrconf removes ipv6 inner device from netdev each time cmu\nchanges and new value is less than IPV6_MIN_MTU (1280 bytes).\nWhen mtu is changed and new value is greater than IPV6_MIN_MTU,\nit does not add ipv6 addresses and inner device bac.\n\nThis patch fixes that.\n\nTested with Avaid\u0027s application, which works ok now.\n\nSigned-off-by: Evgeniy Polyakov \u003cjohnpol@2ka.mipt.ru\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "d5a784b3719ae364f49ecff12a0248f6e4252720",
      "tree": "22d4dae3111045389bf887aaeefd7651bfdb13b6",
      "parents": [
        "75e7766680b4b196073bdc941b8a6570b9f777af"
      ],
      "author": {
        "name": "David Howells",
        "email": "dhowells@redhat.com",
        "time": "Fri Nov 30 23:06:40 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 23:30:40 2007 +1100"
      },
      "message": "[RXRPC]: Add missing select on CRYPTO\n\nAF_RXRPC uses the crypto services, so should depend on or select CRYPTO.\n\nSigned-off-by: David Howells \u003cdhowells@redhat.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "75e7766680b4b196073bdc941b8a6570b9f777af",
      "tree": "71ce4e83878a3dd9a83559c7d51ec549668cef3a",
      "parents": [
        "b7e0fe9f81e19c4f2a1369b324c3c062c1738be4",
        "53cb4791c156908ae634de31949f7f25f8de002b"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 23:29:27 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 23:29:27 2007 +1100"
      },
      "message": "Merge branch \u0027fixes-davem\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "53cb4791c156908ae634de31949f7f25f8de002b",
      "tree": "8e290dbf5bb1ae6b0bc1b9b40222dee31f824fd7",
      "parents": [
        "7f4c534178722ac9ffb4feae3a4d54e3fbe3f22c"
      ],
      "author": {
        "name": "Adel Gadllah",
        "email": "adel.gadllah@gmail.com",
        "time": "Thu Nov 29 17:09:41 2007 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Thu Nov 29 18:08:48 2007 -0500"
      },
      "message": "mac80211: rate limit wep decrypt failed messages\n\nThe attached patch rate limits \"WEP decrypt failed (ICV)\" to avoid\nflooding the logfiles.\n\nSigned-off-by: Adel Gadllah \u003cadel.gadllah@gmx.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "7f4c534178722ac9ffb4feae3a4d54e3fbe3f22c",
      "tree": "5067b23f30c5758bb6d6eee5e169afb98c98cd79",
      "parents": [
        "8312512e81ab16d845b49d1ec695fad1c72f19f6"
      ],
      "author": {
        "name": "Michael Buesch",
        "email": "mb@bu3sch.de",
        "time": "Wed Nov 28 17:49:34 2007 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Thu Nov 29 18:08:48 2007 -0500"
      },
      "message": "rfkill: fix double-mutex-locking\n\nrfkill_toggle_radio is called from functions where\nrfkill-\u003emutex is already aquired.\n\nRemove the lock from rfkill_toggle_radio() and add it to\nthe only calling function that calls it without the lock held.\n\nSigned-off-by: Michael Buesch \u003cmb@bu3sch.de\u003e\nAcked-by: Ivo van Doorn \u003cIvDoorn@gmail.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "8312512e81ab16d845b49d1ec695fad1c72f19f6",
      "tree": "c32ca43a65679197a417ab06fba3bbc542d575f5",
      "parents": [
        "8b393f1dc76acbe65a97a4e51f8144f4a65fa1c9"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Wed Nov 28 11:07:57 2007 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Thu Nov 29 18:08:48 2007 -0500"
      },
      "message": "mac80211: drop unencrypted frames if encryption is expected\n\nThis patch fixes a regression I (most likely) introduced, namely that\nunencrypted frames are right now accepted even if we have a key for that\nspecific sender. That has very bad security implications.\n\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "8b393f1dc76acbe65a97a4e51f8144f4a65fa1c9",
      "tree": "ff1466c1fe5ebd700cc06bde1512900ffcbf5be7",
      "parents": [
        "01e1f045e65b683fe7203b1e16a915bbb94c15fe"
      ],
      "author": {
        "name": "Michael Wu",
        "email": "flamingice@sourmilk.net",
        "time": "Wed Nov 28 01:57:08 2007 -0500"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Thu Nov 29 18:08:47 2007 -0500"
      },
      "message": "mac80211: Fix behavior of ieee80211_open and ieee80211_close\n\nThis patch fixes:\n- Incorrect calls to ieee80211_hw_config when the radiotap flag is set.\n- Failure to actually unset the radiotap flag when all monitors are down.\n- Failure to call ieee80211_hw_config after successful interface start.\n\nSigned-off-by: Michael Wu \u003cflamingice@sourmilk.net\u003e\nAcked-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "01e1f045e65b683fe7203b1e16a915bbb94c15fe",
      "tree": "480686e2f3c5c49bf56ae06ef98998335bdaa38a",
      "parents": [
        "a10605e599a7873417043fe2bb559abe719f8a1a"
      ],
      "author": {
        "name": "Daniel Drake",
        "email": "dsd@gentoo.org",
        "time": "Thu Nov 22 22:03:42 2007 +0000"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Thu Nov 29 18:08:47 2007 -0500"
      },
      "message": "ieee80211: fix unaligned access in ieee80211_copy_snap\n\nThere is no guarantee that data+SNAP_SIZE will reside on an even numbered\naddress, so doing a 16 bit read will cause an unaligned access in some\nsituations. Based on a patch from Jun Sun.\n\nSigned-off-by: Daniel Drake \u003cdsd@gentoo.org\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "a10605e599a7873417043fe2bb559abe719f8a1a",
      "tree": "03447d2c1c0834289d6570e95445043630090615",
      "parents": [
        "d9f8bcbf67a0ee67c8cb0734f003dfe916bb5248"
      ],
      "author": {
        "name": "Zhu Yi",
        "email": "yi.zhu@intel.com",
        "time": "Thu Nov 22 11:10:22 2007 +0800"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Thu Nov 29 18:08:47 2007 -0500"
      },
      "message": "mac80211: free ifsta-\u003eextra_ie and clear IEEE80211_STA_PRIVACY_INVOKED\n\nI\u0027m not sure if this is best choice, someone might have better\nsolutions. But this patch fixed the connection problem when switching\nfrom a WPA enabled AP (using wpa_supplicant) to an open AP (using\niwconfig). The root cause is when we connect to a WPA enabled AP,\nwpa_supplicant sets the ifsta-\u003eextra_ie thru SIOCSIWGENIE. But if we\nstop wpa_supplicant and connect to an open AP with iwconfig, there is\nno way to clear the extra_ie so that mac80211 keeps connecting with that.\n\nSomeone could argue wpa_supplicant should clear the extra_ie during\nits shutdown. But mac80211 should also handle the unexpected shutdown\ncase (ie. killall -9 wpa_supplicant).\n\nOn Wed, 2007-11-21 at 16:19 +0100, Johannes Berg wrote:\n\u003e Yeah. Can you amend the patch to also clear the\n\u003e IEEE80211_STA_PRIVACY_INVOKED flag?\n\nSigned-off-by: Zhu Yi \u003cyi.zhu@intel.com\u003e\nAcked-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "b7e0fe9f81e19c4f2a1369b324c3c062c1738be4",
      "tree": "fe9d856c35e3d0ee5bd5acd9bd6b8dad93a3dd50",
      "parents": [
        "555d3d5d2be13675490a80df0d7961551822ef1f"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Thu Nov 29 09:53:52 2007 -0500"
      },
      "committer": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Thu Nov 29 10:17:42 2007 -0500"
      },
      "message": "SCTP: Fix build issues with SCTP AUTH.\n\nSCTP-AUTH requires selection of CRYPTO, HMAC and SHA1 since\nSHA1 is a MUST requirement for AUTH.  We also support SHA256,\nbut that\u0027s optional, so fix the code to treat it as such.\n\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\n"
    },
    {
      "commit": "555d3d5d2be13675490a80df0d7961551822ef1f",
      "tree": "1ff1e56519885c0dfb5b5b79aa141792ea68d7ae",
      "parents": [
        "8ee4be37e8ac28e79ae673d441e83c1f51e7ecfd"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Thu Nov 29 08:56:16 2007 -0500"
      },
      "committer": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Thu Nov 29 10:17:42 2007 -0500"
      },
      "message": "SCTP: Fix chunk acceptance when no authenticated chunks were listed.\n\nIn the case where no autheticated chunks were specified, we were still\ntrying to verify that a given chunk needs authentication and doing so\nincorrectly.  Add a check for parameter length to make sure we don\u0027t\ntry to use an empty auth_chunks parameter to verify against.\n\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\n"
    },
    {
      "commit": "8ee4be37e8ac28e79ae673d441e83c1f51e7ecfd",
      "tree": "4b37a0656b4dae8b272edb94c7dcf11fdfa76bff",
      "parents": [
        "9baffaa689a50ef9480ecd9017ffd1480c807328"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Thu Nov 29 08:50:35 2007 -0500"
      },
      "committer": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Thu Nov 29 10:17:41 2007 -0500"
      },
      "message": "SCTP: Fix the supported extensions paramter\n\nSupported extensions parameter was not coded right and ended up\nover-writing memory or causing skb overflows.  First, remove\nthe FWD_TSN support from as it shouldn\u0027t be there and also fix\nthe paramter encoding.\n\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\n"
    },
    {
      "commit": "9baffaa689a50ef9480ecd9017ffd1480c807328",
      "tree": "189a6a5752b1b4321b9eccb449688287d6ecfd90",
      "parents": [
        "fd10279bc7405c4f1e47a008686d3d9ad71d7f6d"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Thu Nov 29 08:44:34 2007 -0500"
      },
      "committer": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Thu Nov 29 10:17:41 2007 -0500"
      },
      "message": "SCTP: Fix SCTP-AUTH to correctly add HMACS paramter.\n\nThere was a typo that cleared the HMACS parameters when no\nauthenticated chunks were specified.  We whould be clearing\nthe chunks pointer instead of the hmacs.\n\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\n"
    },
    {
      "commit": "fd10279bc7405c4f1e47a008686d3d9ad71d7f6d",
      "tree": "8b7c4b6b110fe3c439e57a393276ef21baa20056",
      "parents": [
        "a357dde9df33f28611e6a3d4f88265e39bcc8880"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Thu Nov 15 12:13:32 2007 -0500"
      },
      "committer": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Thu Nov 29 10:17:41 2007 -0500"
      },
      "message": "SCTP: Fix the number of HB transmissions.\n\nOur treatment of Heartbeats is special in that the inital HB chunk\ncounts against the error count for the association, where as for\nother chunks, only retransmissions or timeouts count against us.\nAs a result, we had an off-by-1 situation with a number of\nHeartbeats we could send.\n\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\n"
    },
    {
      "commit": "a357dde9df33f28611e6a3d4f88265e39bcc8880",
      "tree": "181c8b1508a84ca30d32c779a508bb475fb96077",
      "parents": [
        "5e5234ff17ef98932688116025b30958bd28a940"
      ],
      "author": {
        "name": "Stephen Hemminger",
        "email": "shemminger@linux-foundation.org",
        "time": "Fri Nov 30 01:10:55 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 01:10:55 2007 +1100"
      },
      "message": "[TCP] illinois: Incorrect beta usage\n\nLachlan Andrew observed that my TCP-Illinois implementation uses the\nbeta value incorrectly:\n  The parameter  beta  in the paper specifies the amount to decrease\n  *by*:  that is, on loss,\n     W \u003c-  W -  beta*W\n  but in   tcp_illinois_ssthresh() uses  beta  as the amount\n  to decrease  *to*: W \u003c- beta*W\n\nThis bug makes the Linux TCP-Illinois get less-aggressive on uncongested network,\nhurting performance. Note: since the base beta value is .5, it has no\nimpact on a congested network.\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@linux-foundation.org\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "5e5234ff17ef98932688116025b30958bd28a940",
      "tree": "c14918fe21d01eeda770856aff55dc2363fd69a2",
      "parents": [
        "076931989fe96823a577259cc6bc205d7ec31754"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 00:50:31 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 00:50:31 2007 +1100"
      },
      "message": "[IPSEC]: Fix uninitialised dst warning in __xfrm_lookup\n\nAndrew Morton reported that __xfrm_lookup generates this warning:\n\nnet/xfrm/xfrm_policy.c: In function \u0027__xfrm_lookup\u0027:\nnet/xfrm/xfrm_policy.c:1449: warning: \u0027dst\u0027 may be used uninitialized in this function\n\nThis is because if policy-\u003eaction is of an unexpected value then dst will\nnot be initialised.  Of course, in practice this should never happen since\nthe input layer xfrm_user/af_key will filter out all illegal values.  But\nthe compiler doesn\u0027t know that of course.\n\nSo this patch fixes this by taking the conservative approach and treat all\nunknown actions the same as a blocking action.\n\nThanks to Andrew for finding this and providing an initial fix.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "076931989fe96823a577259cc6bc205d7ec31754",
      "tree": "9a940f50bfef9b9b9e190696668612aed316b23e",
      "parents": [
        "82de382ce8e1c7645984616728dc7aaa057821e4"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Fri Nov 30 00:08:14 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 00:08:14 2007 +1100"
      },
      "message": "[INET]: Fix inet_diag register vs rcv race\n\nThe following race is possible when one cpu unregisters the handler\nwhile other one is trying to receive a message and call this one:\n\nCPU1:                                                 CPU2:\ninet_diag_rcv()                                       inet_diag_unregister()\n  mutex_lock(\u0026inet_diag_mutex);\n  netlink_rcv_skb(skb, \u0026inet_diag_rcv_msg);\n    if (inet_diag_table[nlh-\u003enlmsg_type] \u003d\u003d \n                               NULL) /* false handler is still registered */\n    ...\n    netlink_dump_start(idiagnl, skb, nlh,\n                           inet_diag_dump, NULL);\n           cb \u003d kzalloc(sizeof(*cb), GFP_KERNEL);\n                   /* sleep here freeing memory \n                    * or preempt\n                    * or sleep later on nlk-\u003ecb_mutex\n                    */\n                                                         spin_lock(\u0026inet_diag_register_lock);\n                                                         inet_diag_table[type] \u003d NULL;\n    ...                                                  spin_unlock(\u0026inet_diag_register_lock);\n                                                         synchronize_rcu();\n                                                         /* CPU1 is sleeping - RCU quiescent\n                                                          * state is passed\n                                                          */\n                                                         return;\n    /* inet_diag_dump is finally called: */\n    inet_diag_dump()\n      handler \u003d inet_diag_table[cb-\u003enlh-\u003enlmsg_type];\n      BUG_ON(handler \u003d\u003d NULL); \n      /* OOPS! While we slept the unregister has set\n       * handler to NULL :(\n       */\n\nGrep showed, that the register/unregister functions are called\nfrom init/fini module callbacks for tcp_/dccp_diag, so it\u0027s OK\nto use the inet_diag_mutex to synchronize manipulations with the\ninet_diag_table and the access to it.\n\nBesides, as Herbert pointed out, asynchronous dumps should hold \nthis mutex as well, and thus, we provide the mutex as cb_mutex one.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "82de382ce8e1c7645984616728dc7aaa057821e4",
      "tree": "980ce308c87e8aa9bbf8381251b805d7d6a108c4",
      "parents": [
        "17efdd45755c0eb8d1418a1368ef7c7ebbe98c6e"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Thu Nov 29 23:58:58 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Nov 29 23:58:58 2007 +1100"
      },
      "message": "[BRIDGE]: Properly dereference the br_should_route_hook\n\nThis hook is protected with the RCU, so simple\n\n\tif (br_should_route_hook)\n\t\tbr_should_route_hook(...)\n\nis not enough on some architectures.\n\nUse the rcu_dereference/rcu_assign_pointer in this case.\n\nFixed Stephen\u0027s comment concerning using the typeof().\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "17efdd45755c0eb8d1418a1368ef7c7ebbe98c6e",
      "tree": "9c35ed698428088f320ef80a222b4339acd4a188",
      "parents": [
        "0a11225887fe6cbccd882404dc36ddc50f47daf9"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Thu Nov 29 23:41:43 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Nov 29 23:41:43 2007 +1100"
      },
      "message": "[BRIDGE]: Lost call to br_fdb_fini() in br_init() error path\n\nIn case the br_netfilter_init() (or any subsequent call) \nfails, the br_fdb_fini() must be called to free the allocated\nin br_fdb_init() br_fdb_cache kmem cache.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "0a11225887fe6cbccd882404dc36ddc50f47daf9",
      "tree": "19f23a33bcd1f794e5e4bf06d0d97f4a0f7a7533",
      "parents": [
        "6ab3b487db77fa98a24560f11a5a8e744b98d877"
      ],
      "author": {
        "name": "Florian Zumbiehl",
        "email": "florz@florz.de",
        "time": "Thu Nov 29 23:19:23 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Nov 29 23:19:23 2007 +1100"
      },
      "message": "[UNIX]: EOF on non-blocking SOCK_SEQPACKET\n\nI am not absolutely sure whether this actually is a bug (as in: I\u0027ve got\nno clue what the standards say or what other implementations do), but at\nleast I was pretty surprised when I noticed that a recv() on a\nnon-blocking unix domain socket of type SOCK_SEQPACKET (which is connection\noriented, after all) where the remote end has closed the connection\nreturned -1 (EAGAIN) rather than 0 to indicate end of file.\n\nThis is a test case:\n\n| #include \u003csys/types.h\u003e\n| #include \u003cunistd.h\u003e\n| #include \u003csys/socket.h\u003e\n| #include \u003csys/un.h\u003e\n| #include \u003cfcntl.h\u003e\n| #include \u003cstring.h\u003e\n| #include \u003cstdlib.h\u003e\n| \n| int main(){\n| \tint sock;\n| \tstruct sockaddr_un addr;\n| \tchar buf[4096];\n| \tint pfds[2];\n| \n| \tpipe(pfds);\n| \tsock\u003dsocket(PF_UNIX,SOCK_SEQPACKET,0);\n| \taddr.sun_family\u003dAF_UNIX;\n| \tstrcpy(addr.sun_path,\"/tmp/foobar_testsock\");\n| \tbind(sock,(struct sockaddr *)\u0026addr,sizeof(addr));\n| \tlisten(sock,1);\n| \tif(fork()){\n| \t\tclose(sock);\n| \t\tsock\u003dsocket(PF_UNIX,SOCK_SEQPACKET,0);\n| \t\tconnect(sock,(struct sockaddr *)\u0026addr,sizeof(addr));\n| \t\tfcntl(sock,F_SETFL,fcntl(sock,F_GETFL)|O_NONBLOCK);\n| \t\tclose(pfds[1]);\n| \t\tread(pfds[0],buf,sizeof(buf));\n| \t\trecv(sock,buf,sizeof(buf),0); // \u003c-- this one\n| \t}else accept(sock,NULL,NULL);\n| \texit(0);\n| }\n\nIf you try it, make sure /tmp/foobar_testsock doesn\u0027t exist.\n\nThe marked recv() returns -1 (EAGAIN) on 2.6.23.9. Below you find a\npatch that fixes that.\n\nSigned-off-by: Florian Zumbiehl \u003cflorz@florz.de\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "6ab3b487db77fa98a24560f11a5a8e744b98d877",
      "tree": "66f991e167a0a4127b613a9cf2335c4d8a193a7b",
      "parents": [
        "dde655c9df02ee07ed090dfdb7ae8741bf299e14"
      ],
      "author": {
        "name": "Joonwoo Park",
        "email": "joonwpark81@gmail.com",
        "time": "Thu Nov 29 22:16:41 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Nov 29 22:16:41 2007 +1100"
      },
      "message": "[VLAN]: Fix nested VLAN transmit bug\n\nFix misbehavior of vlan_dev_hard_start_xmit() for recursive encapsulations.\n\nSigned-off-by: Joonwoo Park \u003cjoonwpark81@gmail.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "8c27eba54970c6ebbb408186e5baa2274435e869",
      "tree": "47348cfc4c008692eee4a9174fcc6d8b20f5e647",
      "parents": [
        "8912858bcb9e314549a4abc15db6b5841a96fa2c",
        "5dba4797115c8fa05c1a4d12927a6ae0b33ffc41"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@woody.linux-foundation.org",
        "time": "Mon Nov 26 20:09:07 2007 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@woody.linux-foundation.org",
        "time": "Mon Nov 26 20:09:07 2007 -0800"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/herbert/net-2.6: (41 commits)\n  [XFRM]: Fix leak of expired xfrm_states\n  [ATM]: [he] initialize lock and tasklet earlier\n  [IPV4]: Remove bogus ifdef mess in arp_process\n  [SKBUFF]: Free old skb properly in skb_morph\n  [IPV4]: Fix memory leak in inet_hashtables.h when NUMA is on\n  [IPSEC]: Temporarily remove locks around copying of non-atomic fields\n  [TCP] MTUprobe: Cleanup send queue check (no need to loop)\n  [TCP]: MTUprobe: receiver window \u0026 data available checks fixed\n  [MAINTAINERS]: tlan list is subscribers-only\n  [SUNRPC]: Remove SPIN_LOCK_UNLOCKED\n  [SUNRPC]: Make xprtsock.c:xs_setup_{udp,tcp}() static\n  [PFKEY]: Sending an SADB_GET responds with an SADB_GET\n  [IRDA]: Compilation for CONFIG_INET\u003dn case\n  [IPVS]: Fix compiler warning about unused register_ip_vs_protocol\n  [ARP]: Fix arp reply when sender ip 0\n  [IPV6] TCPMD5: Fix deleting key operation.\n  [IPV6] TCPMD5: Check return value of tcp_alloc_md5sig_pool().\n  [IPV4] TCPMD5: Use memmove() instead of memcpy() because we have overlaps.\n  [IPV4] TCPMD5: Omit redundant NULL check for kfree() argument.\n  ieee80211: Stop net_ratelimit/IEEE80211_DEBUG_DROP log pollution\n  ...\n"
    },
    {
      "commit": "423eaf8f00d89ca79bb2c9d4d22e92c9774e2d8a",
      "tree": "e160521a6b059d50045ea47c3f730bf2c83c1f85",
      "parents": [
        "0685ab4fb8e527639d9867df60d49dccba85d842",
        "02fe494619d525ea803ab1f4f671186dc8a52f7a"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@woody.linux-foundation.org",
        "time": "Mon Nov 26 19:42:59 2007 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@woody.linux-foundation.org",
        "time": "Mon Nov 26 19:42:59 2007 -0800"
      },
      "message": "Merge git://git.linux-nfs.org/pub/linux/nfs-2.6\n\n* git://git.linux-nfs.org/pub/linux/nfs-2.6:\n  NFS: Clean up new multi-segment direct I/O changes\n  NFS: Ensure we return zero if applications attempt to write zero bytes\n  NFS: Support multiple segment iovecs in the NFS direct I/O path\n  NFS: Introduce iovec I/O helpers to fs/nfs/direct.c\n  SUNRPC: Add missing \"space\" to net/sunrpc/auth_gss.c\n  SUNRPC: make sunrpc/xprtsock.c:xs_setup_{udp,tcp}() static\n  NFS: fs/nfs/dir.c should #include \"internal.h\"\n  NFS: make nfs_wb_page_priority() static\n  NFS: mount failure causes bad page state\n  SUNRPC: remove NFS/RDMA client\u0027s binary sysctls\n  kernel BUG at fs/nfs/namespace.c:108! - can be triggered by bad server\n  sunrpc: rpc_pipe_poll may miss available data in some cases\n  sunrpc: return error if unsupported enctype or cksumtype is encountered\n  sunrpc: gss_pipe_downcall(), don\u0027t assume all errors are transient\n  NFS: Fix the ustat() regression\n"
    },
    {
      "commit": "5dba4797115c8fa05c1a4d12927a6ae0b33ffc41",
      "tree": "6f515e0e29352ff06887ceb272e106e87966f709",
      "parents": [
        "8a8037ac9dbe4eb20ce50aa20244faf77444f4a3"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue Nov 27 11:10:07 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 27 11:10:07 2007 +0800"
      },
      "message": "[XFRM]: Fix leak of expired xfrm_states\n\nThe xfrm_timer calls __xfrm_state_delete, which drops the final reference\nmanually without triggering destruction of the state. Change it to use\nxfrm_state_put to add the state to the gc list when we\u0027re dropping the\nlast reference. The timer function may still continue to use the state\nsafely since the final destruction does a del_timer_sync().\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "014313a9d66272ed37b9ebd64c3f30b596a4c8e1",
      "tree": "98bc1bf224fe381ab111bb4330e8e6970c23d32e",
      "parents": [
        "483066d62ec583fb6379377a9bfa8d5645b91c75"
      ],
      "author": {
        "name": "Joe Perches",
        "email": "joe@perches.com",
        "time": "Mon Nov 19 17:53:43 2007 -0800"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Mon Nov 26 16:24:59 2007 -0500"
      },
      "message": "SUNRPC: Add missing \"space\" to net/sunrpc/auth_gss.c\n\nSigned-off-by: Joe Perches \u003cjoe@perches.com\u003e\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\n"
    },
    {
      "commit": "483066d62ec583fb6379377a9bfa8d5645b91c75",
      "tree": "c8750759402d7aa9f62714ef550d7d9516db6676",
      "parents": [
        "4c30d56edcaaa0446370189e8ab5c5393dc20ca3"
      ],
      "author": {
        "name": "Adrian Bunk",
        "email": "bunk@kernel.org",
        "time": "Wed Oct 24 18:24:02 2007 +0200"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Mon Nov 26 16:24:50 2007 -0500"
      },
      "message": "SUNRPC: make sunrpc/xprtsock.c:xs_setup_{udp,tcp}() static\n\nxs_setup_{udp,tcp}() can now become static.\n\nSigned-off-by: Adrian Bunk \u003cbunk@kernel.org\u003e\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\n"
    },
    {
      "commit": "cfcb43ff7ce28f347a39e1a7519e01850b588718",
      "tree": "3f21947e64316de5499c38d6c76a6ae3dd48996f",
      "parents": [
        "4c1fe2f78a08e2c514a39c91a0eb7b55bbd3c0d2"
      ],
      "author": {
        "name": "James Lentini",
        "email": "jlentini@netapp.com",
        "time": "Mon Nov 26 12:42:44 2007 -0500"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Mon Nov 26 16:21:19 2007 -0500"
      },
      "message": "SUNRPC: remove NFS/RDMA client\u0027s binary sysctls\n\nSupport for binary sysctls is being deprecated in 2.6.24. Since there\nare no applications using the NFS/RDMA client\u0027s binary sysctls, it\nmakes sense to remove them. The patch below does this while leaving\nthe /proc/sys interface unchanged.\n\nPlease consider this for 2.6.24.\n\nSigned-off-by: James Lentini \u003cjlentini@netapp.com\u003e\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\n"
    },
    {
      "commit": "3660019e5f96fd9a8b7d4214a96523c0bf7b676d",
      "tree": "71f6f3fdd539473f5c6d9230c77a9b36d741ec90",
      "parents": [
        "2d4baff8da06f424a6fca10e26434c4926a7c3df"
      ],
      "author": {
        "name": "Adrian Bunk",
        "email": "bunk@kernel.org",
        "time": "Mon Nov 26 23:17:53 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 26 23:17:53 2007 +0800"
      },
      "message": "[IPV4]: Remove bogus ifdef mess in arp_process\n\nThe #ifdef\u0027s in arp_process() were not only a mess, they were also wrong \nin the CONFIG_NET_ETHERNET\u003dn and (CONFIG_NETDEV_1000\u003dy or \nCONFIG_NETDEV_10000\u003dy) cases.\n\nSince they are not required this patch removes them.\n\nAlso removed are some #ifdef\u0027s around #include\u0027s that caused compile \nerrors after this change.\n\nSigned-off-by: Adrian Bunk \u003cbunk@kernel.org\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "2d4baff8da06f424a6fca10e26434c4926a7c3df",
      "tree": "c0f537d5cf0aca544ba77d11b529f146f5ba5bc8",
      "parents": [
        "218ad12f42e0b6207105cde8fd13017d1ed449e4"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 26 23:11:19 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 26 23:11:19 2007 +0800"
      },
      "message": "[SKBUFF]: Free old skb properly in skb_morph\n\nThe skb_morph function only freed the data part of the dst skb, but leaked\nthe auxiliary data such as the netfilter fields.  This patch fixes this by\nmoving the relevant parts from __kfree_skb to skb_release_all and calling\nit in skb_morph.\n\nIt also makes kfree_skbmem static since it\u0027s no longer called anywhere else\nand it now no longer does skb_release_data.\n\nThanks to Yasuyuki KOZAKAI for finding this problem and posting a patch for\nit.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "8053fc3de720e1027d690f892ff7d7c1737fdd9d",
      "tree": "0437efa29587beb5ebb174c402f7954cfde2269a",
      "parents": [
        "7f9c33e515353ea91afc62341161fead19e78567"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 26 19:07:34 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 26 19:07:34 2007 +0800"
      },
      "message": "[IPSEC]: Temporarily remove locks around copying of non-atomic fields\n\nThe change 050f009e16f908932070313c1745d09dc69fd62b\n\n\t[IPSEC]: Lock state when copying non-atomic fields to user-space\n\ncaused a regression.\n\nIngo Molnar reports that it causes a potential dead-lock found by the\nlock validator as it tries to take x-\u003elock within xfrm_state_lock while\nnumerous other sites take the locks in opposite order.\n\nFor 2.6.24, the best fix is to simply remove the added locks as that puts\nus back in the same state as we\u0027ve been in for years.  For later kernels\na proper fix would be to reverse the locking order for every xfrm state\nuser such that if x-\u003elock is taken together with xfrm_state_lock then\nit is to be taken within it.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "7f9c33e515353ea91afc62341161fead19e78567",
      "tree": "3491ab469f790f6c5538de6e24e93c7bbe6a84b1",
      "parents": [
        "91cc17c0e5e5ada156a8d5787a2509d263ea6bbf"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Fri Nov 23 19:10:56 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 23 19:10:56 2007 +0800"
      },
      "message": "[TCP] MTUprobe: Cleanup send queue check (no need to loop)\n\nThe original code has striking complexity to perform a query\nwhich can be reduced to a very simple compare.\n\nFIN seqno may be included to write_seq but it should not make\nany significant difference here compared to skb-\u003elen which was\nused previously. One won\u0027t end up there with SYN still queued.\n\nUse of write_seq check guarantees that there\u0027s a valid skb in\nsend_head so I removed the extra check.\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nAcked-by: John Heffner \u003cjheffner@psc.edu\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "91cc17c0e5e5ada156a8d5787a2509d263ea6bbf",
      "tree": "776cd7cf3438913d6a10b4071c528307eb4db50c",
      "parents": [
        "88c07ddec8c5e06aa331470076af27a397fc0993"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Fri Nov 23 19:08:16 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 23 19:08:16 2007 +0800"
      },
      "message": "[TCP]: MTUprobe: receiver window \u0026 data available checks fixed\n\nIt seems that the checked range for receiver window check should\nbegin from the first rather than from the last skb that is going\nto be included to the probe. And that can be achieved without\nreference to skbs at all, snd_nxt and write_seq provides the\ncorrect seqno already. Plus, it SHOULD account packets that are\nnecessary to trigger fast retransmit [RFC4821].\n\nLocation of snd_wnd \u003c probe_size/size_needed check is bogus\nbecause it will cause the other if() match as well (due to\nsnd_nxt \u003e\u003d snd_una invariant).\n\nRemoved dead obvious comment.\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "5ba03e82b3dac41bb1c5ca29060aa44b5e44b486",
      "tree": "6ff629792f49869c3fb8b473f52e983dfa305349",
      "parents": [
        "5fe4a33430d90243ff93a77ea31e20f7557bca8a"
      ],
      "author": {
        "name": "Jiri Slaby",
        "email": "jirislaby@gmail.com",
        "time": "Thu Nov 22 19:40:22 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Nov 22 19:40:22 2007 +0800"
      },
      "message": "[SUNRPC]: Remove SPIN_LOCK_UNLOCKED\n\nSPIN_LOCK_UNLOCKED is deprecated, use DEFINE_SPINLOCK instead\n\nSigned-off-by: Jiri Slaby \u003cjirislaby@gmail.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "5fe4a33430d90243ff93a77ea31e20f7557bca8a",
      "tree": "c0478ffdb866c598c8e9004370ba0af58df68d2c",
      "parents": [
        "435000bebd94aae3a7a50078d142d11683d3b193"
      ],
      "author": {
        "name": "Adrian Bunk",
        "email": "bunk@kernel.org",
        "time": "Thu Nov 22 19:38:25 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Nov 22 19:38:25 2007 +0800"
      },
      "message": "[SUNRPC]: Make xprtsock.c:xs_setup_{udp,tcp}() static\n\nxs_setup_{udp,tcp}() can now become static.\n\nSigned-off-by: Adrian Bunk \u003cbunk@kernel.org\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "435000bebd94aae3a7a50078d142d11683d3b193",
      "tree": "f40c9c1a6b21db3d720ff608b3f81ce1f32f77ea",
      "parents": [
        "8c92e6b0bf48a1735ddc61ebb08a0bb77c6bfa23"
      ],
      "author": {
        "name": "Charles Hardin",
        "email": "chardin@2wire.com",
        "time": "Thu Nov 22 19:35:15 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Nov 22 19:35:15 2007 +0800"
      },
      "message": "[PFKEY]: Sending an SADB_GET responds with an SADB_GET\n\nFrom: Charles Hardin \u003cchardin@2wire.com\u003e\n\nKernel needs to respond to an SADB_GET with the same message type to\nconform to the RFC 2367 Section 3.1.5\n\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "8c92e6b0bf48a1735ddc61ebb08a0bb77c6bfa23",
      "tree": "f4d48d92cc9c41d9f15b63d22d912dbe58272226",
      "parents": [
        "d535a916cdb1620d936a0a6197194c458854bd71"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Thu Nov 22 19:15:56 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Nov 22 19:15:56 2007 +0800"
      },
      "message": "[IRDA]: Compilation for CONFIG_INET\u003dn case\n\nFound this occasionally. \n\nThe CONFIG_INET\u003dn is hardly ever set, but if it is the \nirlan_eth_send_gratuitous_arp() compilation should produce a \nwarning about unused variable in_dev.\n\nToo pedantic? :)\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "d535a916cdb1620d936a0a6197194c458854bd71",
      "tree": "1117969a146d7cc0a05c816e593e9ca1f661ebaf",
      "parents": [
        "b4a9811c42ecb70b2f0b375f6d4c77ab34d1f598"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Tue Nov 20 17:44:01 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 20 17:44:01 2007 -0800"
      },
      "message": "[IPVS]: Fix compiler warning about unused register_ip_vs_protocol\n\nThis is silly, but I have turned the CONFIG_IP_VS to m,\nto check the compilation of one (recently sent) fix\nand set all the CONFIG_IP_VS_PROTO_XXX options to n to\nspeed up the compilation.\n\nIn this configuration the compiler warns me about\n\n  CC [M]  net/ipv4/ipvs/ip_vs_proto.o\nnet/ipv4/ipvs/ip_vs_proto.c:49: warning: \u0027register_ip_vs_protocol\u0027 defined but not used\n\nIndeed. With no protocols selected there are no\ncalls to this function - all are compiled out with\nifdefs.\n\nMaybe the best fix would be to surround this call with\nifdef-s or tune the Kconfig dependences, but I think that\nmarking this register function as __used is enough. No?\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nAcked-by: Simon Horman \u003chorms@verge.net.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b4a9811c42ecb70b2f0b375f6d4c77ab34d1f598",
      "tree": "84cb96d0195a995b6d5bd5ca31c6c270e6097dbc",
      "parents": [
        "77adefdc9863d63f8d8bdc6a9adcdf9a6b0e2410"
      ],
      "author": {
        "name": "Jonas Danielsson",
        "email": "the.sator@gmail.com",
        "time": "Tue Nov 20 17:38:16 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 20 17:38:16 2007 -0800"
      },
      "message": "[ARP]: Fix arp reply when sender ip 0\n\nFix arp reply when received arp probe with sender ip 0.\n\nSend arp reply with target ip address 0.0.0.0 and target hardware\naddress set to hardware address of requester. Previously sent reply\nwith target ip address and target hardware address set to same as\nsource fields.\n\nSigned-off-by: Jonas Danielsson \u003cthe.sator@gmail.com\u003e\nAcked-by: Alexey Kuznetov \u003ckuznet@ms2.inr.ac.ru\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "77adefdc9863d63f8d8bdc6a9adcdf9a6b0e2410",
      "tree": "4fe2532ad5ab2e9db497cf416acd5db634a4cd6a",
      "parents": [
        "aacbe8c8800adfea42eb754396c6ebcd992cb36a"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Tue Nov 20 17:31:23 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 20 17:31:23 2007 -0800"
      },
      "message": "[IPV6] TCPMD5: Fix deleting key operation.\n\nDue to the bug, refcnt for md5sig pool was leaked when\nan user try to delete a key if we have more than one key.\nIn addition to the leakage, we returned incorrect return\nresult value for userspace.\n\nThis fix should close Bug #9418, reported by \u003cming-baini@163.com\u003e.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "aacbe8c8800adfea42eb754396c6ebcd992cb36a",
      "tree": "e158faf799c888808ddd40bfd16f4793d3522322",
      "parents": [
        "354faf0977397cea382e9e9c214fd028377d277b"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Tue Nov 20 17:30:56 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 20 17:30:56 2007 -0800"
      },
      "message": "[IPV6] TCPMD5: Check return value of tcp_alloc_md5sig_pool().\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "354faf0977397cea382e9e9c214fd028377d277b",
      "tree": "5b3082736caaf676dcee2618db8cfb127a213f55",
      "parents": [
        "a80cc20da492d9a00b0851a6632dc03fed5d2e30"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Tue Nov 20 17:30:31 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 20 17:30:31 2007 -0800"
      },
      "message": "[IPV4] TCPMD5: Use memmove() instead of memcpy() because we have overlaps.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a80cc20da492d9a00b0851a6632dc03fed5d2e30",
      "tree": "721cc20b229b5ed0156a4e1e390923b0f3c32625",
      "parents": [
        "53438e5d04f156dc36ff5cf44740262205bfb206"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Tue Nov 20 17:30:06 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 20 17:30:06 2007 -0800"
      },
      "message": "[IPV4] TCPMD5: Omit redundant NULL check for kfree() argument.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "53438e5d04f156dc36ff5cf44740262205bfb206",
      "tree": "ddc33d943e84111db315647b7dc2118422b2dd6b",
      "parents": [
        "1f305323ff5b9ddc1a4346d36072bcdb58f3f68a",
        "92468c53cf5af0aea06caec7b7d416c18e973685"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Nov 20 17:24:29 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Nov 20 17:24:29 2007 -0800"
      },
      "message": "Merge branch \u0027fixes-davem\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "92468c53cf5af0aea06caec7b7d416c18e973685",
      "tree": "f030ad479614a0832585d549d51d4ff8fb3f264f",
      "parents": [
        "4b50e388f88ab08f6c2f54f0a33e696ff2de269f"
      ],
      "author": {
        "name": "Guillaume Chazarain",
        "email": "guichaz@yahoo.fr",
        "time": "Mon Nov 19 10:07:00 2007 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Nov 20 16:43:17 2007 -0500"
      },
      "message": "ieee80211: Stop net_ratelimit/IEEE80211_DEBUG_DROP log pollution\n\nif (net_ratelimit())\n\tIEEE80211_DEBUG_DROP(...)\n\ncan pollute the logs with messages like:\n\nprintk: 1 messages suppressed.\nprintk: 2 messages suppressed.\nprintk: 7 messages suppressed.\n\nif debugging information is disabled. These messages are printed by\nnet_ratelimit(). Add a wrapper to net_ratelimit() that takes into account\nthe log level, so that net_ratelimit() is called only when we really want\nto print something.\n\nSigned-off-by: Guillaume Chazarain \u003cguichaz@yahoo.fr\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "4b50e388f88ab08f6c2f54f0a33e696ff2de269f",
      "tree": "d3eeb2a424dbd7e1881c6cd52b81aedcdda97eff",
      "parents": [
        "c1428b3f45d152a300e4f18638ebf30ceafda6c3"
      ],
      "author": {
        "name": "Bruno Randolf",
        "email": "bruno@thinktube.com",
        "time": "Fri Nov 16 17:04:01 2007 +0900"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Nov 20 16:43:17 2007 -0500"
      },
      "message": "mac80211: add missing space in error message\n\nSigned-off-by: Bruno Randolf \u003cbruno@thinktube.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "c1428b3f45d152a300e4f18638ebf30ceafda6c3",
      "tree": "b20a916281f23052a0001771c95d49d3364960a9",
      "parents": [
        "b52f2198ac889561d341c6990d669a671f93f450"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Fri Nov 16 02:54:53 2007 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Nov 20 16:20:31 2007 -0500"
      },
      "message": "mac80211: fix allmulti/promisc behaviour\n\nWhen an interface with promisc/allmulti bit is taken down,\nthe mac80211 state can become confused. This fixes it by\nmaking mac80211 keep track of all *active* interfaces that\nhave the promisc/allmulti bit set in the sdata, we sync\nthe interface bit into sdata at set_multicast_list() time\nso this works.\n\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "b52f2198ac889561d341c6990d669a671f93f450",
      "tree": "7455ca159f383f4a359d74a3dd5c08fcf8d216a1",
      "parents": [
        "d9f8bcbf67a0ee67c8cb0734f003dfe916bb5248"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Fri Nov 16 01:49:11 2007 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Nov 20 16:20:30 2007 -0500"
      },
      "message": "mac80211: fix ieee80211_set_multicast_list\n\nI recently experienced unexplainable behaviour with the b43\ndriver when I had broken firmware uploaded. The cause may have\nbeen that promisc mode was not correctly enabled or disabled\nand this bug may have been the cause.\n\nNote how the values are compared later in the function so\njust doing the \u0026 will result in the wrong thing being\ncompared and the test being false almost always.\n\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "1f305323ff5b9ddc1a4346d36072bcdb58f3f68a",
      "tree": "aa4497ece78e8fe53113d6d39bca8a2159d88c7d",
      "parents": [
        "0a06ea87185531705e4417e3a051f81b64f210c1"
      ],
      "author": {
        "name": "Evgeniy Polyakov",
        "email": "johnpol@2ka.mipt.ru",
        "time": "Tue Nov 20 04:27:35 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 20 04:27:35 2007 -0800"
      },
      "message": "[NETFILTER]: Fix kernel panic with REDIRECT target.\n\nWhen connection tracking entry (nf_conn) is about to copy itself it can\nhave some of its extension users (like nat) as being already freed and\nthus not required to be copied.\n\nActually looking at this function I suspect it was copied from\nnf_nat_setup_info() and thus bug was introduced.\n\nReport and testing from David \u003cdavid@unsolicited.net\u003e.\n\n[ Patrick McHardy states:\n\n\tI now understand whats happening:\n\n\t- new connection is allocated without helper\n\t- connection is REDIRECTed to localhost\n\t- nf_nat_setup_info adds NAT extension, but doesn\u0027t initialize it yet\n\t- nf_conntrack_alter_reply performs a helper lookup based on the\n\t   new tuple, finds the SIP helper and allocates a helper extension,\n\t   causing reallocation because of too little space\n\t- nf_nat_move_storage is called with the uninitialized nat extension\n\n\tSo your fix is entirely correct, thanks a lot :)  ]\n\nSigned-off-by: Evgeniy Polyakov \u003cjohnpol@2ka.mipt.ru\u003e\nAcked-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0a06ea87185531705e4417e3a051f81b64f210c1",
      "tree": "703406ed0893a28e6940f273c81af0bdc9081c06",
      "parents": [
        "a572da43738f156a6c81034467da429903483687"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Nov 20 03:29:53 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Nov 20 03:29:53 2007 -0800"
      },
      "message": "[WIRELESS] WEXT: Fix userspace corruption on 64-bit.\n\nOn 64-bit systems sizeof(struct ifreq) is 8 bytes larger than\nsizeof(struct iwreq).\n\nFor GET calls, the wireless extension code copies back into userspace\nusing sizeof(struct ifreq) but userspace and elsewhere only allocates\na \"struct iwreq\".  Thus, this copy writes past the end of the iwreq\nobject and corrupts whatever sits after it in memory.\n\nFix the copy_to_user() length.\n\nThis particularly hurts the compat case because the wireless compat\ncode uses compat_alloc_userspace() and right after this allocated\nbuffer is the current bottom of the user stack, and that\u0027s what gets\noverwritten by the copy_to_user() call.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "70cf5035dedaeddf8f6ae5c0a74ea65dcd7356ab",
      "tree": "91f52593f195eb65f3494529b2a37f4d2726fdd3",
      "parents": [
        "677d762319facc20467243c6dd9487261e3515b0"
      ],
      "author": {
        "name": "Christoph Lameter",
        "email": "clameter@sgi.com",
        "time": "Tue Nov 20 11:13:38 2007 +0100"
      },
      "committer": {
        "name": "Martin Schwidefsky",
        "email": "schwidefsky@de.ibm.com",
        "time": "Tue Nov 20 11:13:47 2007 +0100"
      },
      "message": "[S390] Explicitly code allocpercpu calls in iucv\n\nThe iucv is the only user of the various functions that are used to bring\nparts of cpus up and down. Its the only allocpercpu user that will do\nI/O on per cpu objects (which is difficult to do with virtually mapped memory).\nAnd its the only use of allocpercpu where a GFP_DMA allocation is done.\n\nRemove the allocpercpu calls from iucv and code the allocation and freeing\nmanually. After this patch it is possible to remove a large part of\nthe allocpercpu API.\n\nSigned-off-by: Christoph Lameter \u003cclameter@sgi.com\u003e\nSigned-off-by: Martin Schwidefsky \u003cschwidefsky@de.ibm.com\u003e\n"
    },
    {
      "commit": "a572da43738f156a6c81034467da429903483687",
      "tree": "113506bc67a7fbce24e90cfdf588e1cd034f0a20",
      "parents": [
        "c3c9d45828255dcb63d695a3229a25cba97a9bdf"
      ],
      "author": {
        "name": "Joe Perches",
        "email": "joe@perches.com",
        "time": "Mon Nov 19 23:48:30 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 19 23:48:30 2007 -0800"
      },
      "message": "[IRDA]: Add missing \"space\"\n\nSigned-off-by: Joe Perches \u003cjoe@perches.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c3c9d45828255dcb63d695a3229a25cba97a9bdf",
      "tree": "09db40fe5dc8cc6ed223239d2e9b65ccfea0a797",
      "parents": [
        "9ee46f1d31cf70b7e6375bc50b811f529b7bc82e"
      ],
      "author": {
        "name": "Joe Perches",
        "email": "joe@perches.com",
        "time": "Mon Nov 19 23:48:08 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 19 23:48:08 2007 -0800"
      },
      "message": "[SUNRPC]: Add missing \"space\"\n\nSigned-off-by: Joe Perches \u003cjoe@perches.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9ee46f1d31cf70b7e6375bc50b811f529b7bc82e",
      "tree": "dc091eeee6f9adc27e32ad7f527f40ee9af2d786",
      "parents": [
        "3b6d821c4f06b4c25704bc11d05e68cdd16b4278"
      ],
      "author": {
        "name": "Joe Perches",
        "email": "joe@perches.com",
        "time": "Mon Nov 19 23:47:47 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 19 23:47:47 2007 -0800"
      },
      "message": "[SCTP]: Add missing \"space\"\n\nSigned-off-by: Joe Perches \u003cjoe@perches.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3b6d821c4f06b4c25704bc11d05e68cdd16b4278",
      "tree": "21e1e8a80345ea31479145c469abaa3fbffe6400",
      "parents": [
        "3a47a68b05ad4b2da54d8c77262459465436387b"
      ],
      "author": {
        "name": "Joe Perches",
        "email": "joe@perches.com",
        "time": "Mon Nov 19 23:47:25 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 19 23:47:25 2007 -0800"
      },
      "message": "[IPV6]: Add missing \"space\"\n\nSigned-off-by: Joe Perches \u003cjoe@perches.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    }
  ],
  "next": "3a47a68b05ad4b2da54d8c77262459465436387b"
}
