)]}'
{
  "log": [
    {
      "commit": "a9cf73ea7ff78f52662c8658d93c226effbbedde",
      "tree": "07a723cb628f223e4f756f0cb02eeba8b6ee9c62",
      "parents": [
        "10022a6c66e199d8f61d9044543f38785713cbbd"
      ],
      "author": {
        "name": "Shan Wei",
        "email": "shanwei@cn.fujitsu.com",
        "time": "Tue Apr 19 22:52:49 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 21 10:39:10 2011 -0700"
      },
      "message": "ipv6: udp: fix the wrong headroom check\n\nAt this point, skb-\u003edata points to skb_transport_header.\nSo, headroom check is wrong.\n\nFor some case:bridge(UFO is on) + eth device(UFO is off),\nthere is no enough headroom for IPv6 frag head.\nBut headroom check is always false.\n\nThis will bring about data be moved to there prior to skb-\u003ehead,\nwhen adding IPv6 frag header to skb.\n\nSigned-off-by: Shan Wei \u003cshanwei@cn.fujitsu.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "10022a6c66e199d8f61d9044543f38785713cbbd",
      "tree": "8b934ebc8a5a5277a486413c343afc35a55076bd",
      "parents": [
        "2430af8b7fa37ac0be102c77f9dc6ee669d24ba9"
      ],
      "author": {
        "name": "Oliver Hartkopp",
        "email": "socketcan@hartkopp.net",
        "time": "Wed Apr 20 01:57:15 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 20 12:37:59 2011 -0700"
      },
      "message": "can: add missing socket check in can/raw release\n\nv2: added space after \u0027if\u0027 according code style.\n\nWe can get here with a NULL socket argument passed from userspace,\nso we need to handle it accordingly.\n\nThanks to Dave Jones pointing at this issue in net/can/bcm.c\n\nSigned-off-by: Oliver Hartkopp \u003csocketcan@hartkopp.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c6914a6f261aca0c9f715f883a353ae7ff51fe83",
      "tree": "05138f623ae01c13dbfeb5e9b38ae1b5e1bdde73",
      "parents": [
        "0b0dc0f17f98b59772ca6380c7d5ce4cc593a974"
      ],
      "author": {
        "name": "Dave Jones",
        "email": "davej@redhat.com",
        "time": "Tue Apr 19 20:36:59 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 19 20:36:59 2011 -0700"
      },
      "message": "can: Add missing socket check in can/bcm release.\n\nWe can get here with a NULL socket argument passed from userspace,\nso we need to handle it accordingly.\n\nSigned-off-by: Dave Jones \u003cdavej@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0b0dc0f17f98b59772ca6380c7d5ce4cc593a974",
      "tree": "1f1248a3402d519f522efaf91b68c8f85e2436bc",
      "parents": [
        "0553c891fabd287726b41076cfd03fe7e5ab596f",
        "a8a8a0937e22a5fd55aeb22586724ba6bb70aadd"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 19 11:28:35 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 19 11:28:35 2011 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6\n"
    },
    {
      "commit": "a8a8a0937e22a5fd55aeb22586724ba6bb70aadd",
      "tree": "28e610c98f0f71e42e9676fc3e3e6bb9fe112056",
      "parents": [
        "eafbd3fde6fc5ada0d61307367e408813b04928a"
      ],
      "author": {
        "name": "Jozsef Kadlecsik",
        "email": "kadlec@blackhole.kfki.hu",
        "time": "Tue Apr 19 15:59:15 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue Apr 19 15:59:15 2011 +0200"
      },
      "message": "netfilter: ipset: Fix the order of listing of sets\n\nA restoreable saving of sets requires that list:set type of sets\ncome last and the code part which should have taken into account\nthe ordering was broken. The patch fixes the listing order.\n\nSigned-off-by: Jozsef Kadlecsik \u003ckadlec@blackhole.kfki.hu\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "c65353daf137dd41f3ede3baf62d561fca076228",
      "tree": "407488cc052fff615d61c889100a76e057c1f203",
      "parents": [
        "49b4947aae404c8c5758ffd1007d0d78c48b3643"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Apr 14 05:55:37 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 14 23:26:02 2011 -0700"
      },
      "message": "ip: ip_options_compile() resilient to NULL skb route\n\nScot Doyle demonstrated ip_options_compile() could be called with an skb\nwithout an attached route, using a setup involving a bridge, netfilter,\nand forged IP packets.\n\nLet\u0027s make ip_options_compile() and ip_options_rcv_srr() a bit more\nrobust, instead of changing bridge/netfilter code.\n\nWith help from Hiroaki SHIMODA.\n\nReported-by: Scot Doyle \u003clkml@scotdoyle.com\u003e\nTested-by: Scot Doyle \u003clkml@scotdoyle.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nCc: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nAcked-by: Hiroaki SHIMODA \u003cshimoda.hiroaki@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3e8c806a08c7beecd972e7ce15c570b9aba64baa",
      "tree": "89b0b7bfc919ec8e7dc0866f16715bb626af0cc6",
      "parents": [
        "91a403caf0f26c71ce4407fd235b2d6fb225fba9"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 13 12:01:14 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 13 12:01:14 2011 -0700"
      },
      "message": "Revert \"tcp: disallow bind() to reuse addr/port\"\n\nThis reverts commit c191a836a908d1dd6b40c503741f91b914de3348.\n\nIt causes known regressions for programs that expect to be able to use\nSO_REUSEADDR to shutdown a socket, then successfully rebind another\nsocket to the same ID.\n\nPrograms such as haproxy and amavisd expect this to work.\n\nThis should fix kernel bugzilla 32832.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "eafbd3fde6fc5ada0d61307367e408813b04928a",
      "tree": "4a8a2f60317d3f50b5633e47023e4fdcb0d0408d",
      "parents": [
        "0e8a835aa59d08d702af0fcfd296e2218b2e344b"
      ],
      "author": {
        "name": "Jozsef Kadlecsik",
        "email": "kadlec@blackhole.kfki.hu",
        "time": "Wed Apr 13 13:45:57 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Apr 13 13:45:57 2011 +0200"
      },
      "message": "netfilter: ipset: set match and SET target fixes\n\nThe SET target with --del-set did not work due to using wrongly\nthe internal dimension of --add-set instead of --del-set.\nAlso, the checkentries did not release the set references when\nreturned an error. Bugs reported by Lennert Buytenhek.\n\nSigned-off-by: Jozsef Kadlecsik \u003ckadlec@blackhole.kfki.hu\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "0e8a835aa59d08d702af0fcfd296e2218b2e344b",
      "tree": "cfc99302895c328a9f394ead9695e8e99ac92de1",
      "parents": [
        "b32e3dc7860d00124fa432dba09667e647cb9bcc"
      ],
      "author": {
        "name": "Jozsef Kadlecsik",
        "email": "kadlec@blackhole.kfki.hu",
        "time": "Wed Apr 13 13:43:23 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Apr 13 13:43:23 2011 +0200"
      },
      "message": "netfilter: ipset: bitmap:ip,mac type requires \"src\" for MAC\n\nEnforce that the second \"src/dst\" parameter of the set match and SET target\nmust be \"src\", because we have access to the source MAC only in the packet.\nThe previous behaviour, that the type required the second parameter\nbut actually ignored the value was counter-intuitive and confusing.\n\nSigned-off-by: Jozsef Kadlecsik \u003ckadlec@blackhole.kfki.hu\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "9494c7c5774d64a84a269aad38c153c4dbff97e6",
      "tree": "03d1eb5fffa30789455f12fb59bbd917e465e8c9",
      "parents": [
        "25f7bf7d0dfb460505cbe42676340e33100aca2e"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Tue Apr 12 15:22:22 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 19:33:51 2011 -0700"
      },
      "message": "sctp: fix oops while removed transport still using as retran path\n\nSince we can not update retran path to unconfirmed transports,\nwhen we remove a peer, the retran path may not be update if the\nother transports are all unconfirmed, and we will still using\nthe removed transport as the retran path. This may cause panic\nif retrasnmit happen.\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "25f7bf7d0dfb460505cbe42676340e33100aca2e",
      "tree": "76467af7ca483f836f9acc2fc73f000db6223a4e",
      "parents": [
        "31d8b9e099e59f880aa65095951559896d4e20fa"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Tue Apr 12 15:20:48 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 19:33:50 2011 -0700"
      },
      "message": "sctp: fix oops when updating retransmit path with DEBUG on\n\ncommit fbdf501c9374966a56829ecca3a7f25d2b49a305\n  sctp: Do no select unconfirmed transports for retransmissions\n\nIntroduced the initial falt.\n\ncommit d598b166ced20d9b9281ea3527c0e18405ddb803\n  sctp: Make sure we always return valid retransmit path\n\nSolved the problem, but forgot to change the DEBUG statement.\nThus it was still possible to dereference a NULL pointer.\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "31d8b9e099e59f880aa65095951559896d4e20fa",
      "tree": "e6bd8f1efe81265603bf982e135522c54ed81377",
      "parents": [
        "ea2d36883ca8e6caab23b6d15bfa80b1d1d81d2f"
      ],
      "author": {
        "name": "Ben Hutchings",
        "email": "bhutchings@solarflare.com",
        "time": "Tue Apr 12 14:47:15 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 19:29:45 2011 -0700"
      },
      "message": "net: Disable NETIF_F_TSO_ECN when TSO is disabled\n\nNETIF_F_TSO_ECN has no effect when TSO is disabled; this just means\nthat feature state will be accurately reported to user-space.\n\nSigned-off-by: Ben Hutchings \u003cbhutchings@solarflare.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ea2d36883ca8e6caab23b6d15bfa80b1d1d81d2f",
      "tree": "38818d7330814e276b5e651ec4540ac2eb41d774",
      "parents": [
        "c0212fb146bf3e77cd6b28a06b8f503e2974fdc8"
      ],
      "author": {
        "name": "Ben Hutchings",
        "email": "bhutchings@solarflare.com",
        "time": "Tue Apr 12 14:38:37 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 19:29:45 2011 -0700"
      },
      "message": "net: Disable all TSO features when SG is disabled\n\nThe feature flags NETIF_F_TSO and NETIF_F_TSO6 independently enable\nTSO for IPv4 and IPv6 respectively.  However, the test in\nnetdev_fix_features() and its predecessor functions was never updated\nto check for NETIF_F_TSO6, possibly because it was originally proposed\nthat TSO for IPv6 would be dependent on both feature flags.\n\nNow that these feature flags can be changed independently from\nuser-space and we depend on netdev_fix_features() to fix invalid\nfeature combinations, it\u0027s important to disable them both if\nscatter-gather is disabled.  Also disable NETIF_F_TSO_ECN so\nuser-space sees all TSO features as disabled.\n\nSigned-off-by: Ben Hutchings \u003cbhutchings@solarflare.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "bfac3693c426d280b026f6a1b77dc2294ea43fea",
      "tree": "25435a6df564c1f0f33f31ab86f5b786bc502817",
      "parents": [
        "020318d0d2af51e0fd59ba654ede9b2171558720"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 15:33:23 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 15:33:23 2011 -0700"
      },
      "message": "ieee802154: Remove hacked CFLAGS in net/ieee802154/Makefile\n\nIt adds -Wall (which the kernel carefully controls already) and of all\nthings -DDEBUG (which should be set by other means if desired, please\nwe have dynamic-debug these days).\n\nKill this noise.\n\nReported-by: Dave Jones \u003cdavej@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "020318d0d2af51e0fd59ba654ede9b2171558720",
      "tree": "9b1e7094790e5559bb4fe89719e626d7bee851da",
      "parents": [
        "3d894a9c1959acaa6981283619b465f75f7e535e"
      ],
      "author": {
        "name": "Dave Jones",
        "email": "davej@redhat.com",
        "time": "Tue Apr 12 15:29:54 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 15:29:54 2011 -0700"
      },
      "message": "irda: fix locking unbalance in irda_sendmsg\n\n5b40964eadea40509d353318d2c82e8b7bf5e8a5 (\"irda: Remove BKL instances\nfrom af_irda.c\") introduced a path where we have a locking unbalance.\nIf we pass invalid flags, we unlock a socket we never locked,\nresulting in this...\n\n\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n[ BUG: bad unlock balance detected! ]\n-------------------------------------\ntrinity/20101 is trying to release lock (sk_lock-AF_IRDA) at:\n[\u003cffffffffa057f001\u003e] irda_sendmsg+0x207/0x21d [irda]\nbut there are no more locks to release!\n\nother info that might help us debug this:\nno locks held by trinity/20101.\n\nstack backtrace:\nPid: 20101, comm: trinity Not tainted 2.6.39-rc3+ #3\nCall Trace:\n [\u003cffffffffa057f001\u003e] ? irda_sendmsg+0x207/0x21d [irda]\n [\u003cffffffff81085041\u003e] print_unlock_inbalance_bug+0xc7/0xd2\n [\u003cffffffffa057f001\u003e] ? irda_sendmsg+0x207/0x21d [irda]\n [\u003cffffffff81086aca\u003e] lock_release+0xcf/0x18e\n [\u003cffffffff813ed190\u003e] release_sock+0x2d/0x155\n [\u003cffffffffa057f001\u003e] irda_sendmsg+0x207/0x21d [irda]\n [\u003cffffffff813e9f8c\u003e] __sock_sendmsg+0x69/0x75\n [\u003cffffffff813ea105\u003e] sock_sendmsg+0xa1/0xb6\n [\u003cffffffff81100ca3\u003e] ? might_fault+0x5c/0xac\n [\u003cffffffff81086b7c\u003e] ? lock_release+0x181/0x18e\n [\u003cffffffff81100cec\u003e] ? might_fault+0xa5/0xac\n [\u003cffffffff81100ca3\u003e] ? might_fault+0x5c/0xac\n [\u003cffffffff81133b94\u003e] ? fcheck_files+0xb9/0xf0\n [\u003cffffffff813f387a\u003e] ? copy_from_user+0x2f/0x31\n [\u003cffffffff813f3b70\u003e] ? verify_iovec+0x52/0xa6\n [\u003cffffffff813eb4e3\u003e] sys_sendmsg+0x23a/0x2b8\n [\u003cffffffff81086b7c\u003e] ? lock_release+0x181/0x18e\n [\u003cffffffff810773c6\u003e] ? up_read+0x28/0x2c\n [\u003cffffffff814bec3d\u003e] ? do_page_fault+0x360/0x3b4\n [\u003cffffffff81087043\u003e] ? trace_hardirqs_on_caller+0x10b/0x12f\n [\u003cffffffff810458aa\u003e] ? finish_task_switch+0xb2/0xe3\n [\u003cffffffff8104583e\u003e] ? finish_task_switch+0x46/0xe3\n [\u003cffffffff8108364a\u003e] ? trace_hardirqs_off_caller+0x33/0x90\n [\u003cffffffff814bbaf9\u003e] ? retint_swapgs+0x13/0x1b\n [\u003cffffffff81087043\u003e] ? trace_hardirqs_on_caller+0x10b/0x12f\n [\u003cffffffff810a9dd3\u003e] ? audit_syscall_entry+0x11c/0x148\n [\u003cffffffff8125609e\u003e] ? trace_hardirqs_on_thunk+0x3a/0x3f\n [\u003cffffffff814c22c2\u003e] system_call_fastpath+0x16/0x1b\n\nSigned-off-by: Dave Jones \u003cdavej@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "192910a6cca5e50e5bd6cbd1da0e7376c7adfe62",
      "tree": "c7638554eb015ac8a1306d6916c047adc164e960",
      "parents": [
        "66944e1c5797562cebe2d1857d46dff60bf9a69e"
      ],
      "author": {
        "name": "Joakim Tjernlund",
        "email": "Joakim.Tjernlund@transmode.se",
        "time": "Tue Apr 12 13:59:33 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 13:59:33 2011 -0700"
      },
      "message": "net: Do not wrap sysctl igmp_max_memberships in IP_MULTICAST\n\ncontrolling igmp_max_membership is useful even when IP_MULTICAST\nis off.\nQuagga(an OSPF deamon) uses multicast addresses for all interfaces\nusing a single socket and hits igmp_max_membership limit when\nthere are 20 interfaces or more.\nAlways export sysctl igmp_max_memberships in proc, just like\nigmp_max_msf\n\nSigned-off-by: Joakim Tjernlund \u003cJoakim.Tjernlund@transmode.se\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "66944e1c5797562cebe2d1857d46dff60bf9a69e",
      "tree": "8e7ff0099a1298daa15286788c2bfc7f395e3d74",
      "parents": [
        "f8e9881c2aef1e982e5abc25c046820cd0b7cf64"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Mon Apr 11 22:39:40 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 13:58:33 2011 -0700"
      },
      "message": "inetpeer: reduce stack usage\n\nOn 64bit arches, we use 752 bytes of stack when cleanup_once() is called\nfrom inet_getpeer().\n\nLets share the avl stack to save ~376 bytes.\n\nBefore patch :\n\n# objdump -d net/ipv4/inetpeer.o | scripts/checkstack.pl\n\n0x000006c3 unlink_from_pool [inetpeer.o]:\t\t376\n0x00000721 unlink_from_pool [inetpeer.o]:\t\t376\n0x00000cb1 inet_getpeer [inetpeer.o]:\t\t\t376\n0x00000e6d inet_getpeer [inetpeer.o]:\t\t\t376\n0x0004 inet_initpeers [inetpeer.o]:\t\t\t112\n# size net/ipv4/inetpeer.o\n   text\t   data\t    bss\t    dec\t    hex\tfilename\n   5320\t    432\t     21\t   5773\t   168d\tnet/ipv4/inetpeer.o\n\nAfter patch :\n\nobjdump -d net/ipv4/inetpeer.o | scripts/checkstack.pl\n0x00000c11 inet_getpeer [inetpeer.o]:\t\t\t376\n0x00000dcd inet_getpeer [inetpeer.o]:\t\t\t376\n0x00000ab9 peer_check_expire [inetpeer.o]:\t\t328\n0x00000b7f peer_check_expire [inetpeer.o]:\t\t328\n0x0004 inet_initpeers [inetpeer.o]:\t\t\t112\n# size net/ipv4/inetpeer.o\n   text\t   data\t    bss\t    dec\t    hex\tfilename\n   5163\t    432\t     21\t   5616\t   15f0\tnet/ipv4/inetpeer.o\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nCc: Scot Doyle \u003clkml@scotdoyle.com\u003e\nCc: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nCc: Hiroaki SHIMODA \u003cshimoda.hiroaki@gmail.com\u003e\nReviewed-by: Hiroaki SHIMODA \u003cshimoda.hiroaki@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f8e9881c2aef1e982e5abc25c046820cd0b7cf64",
      "tree": "be6286761107774543025b577e32535bee55504b",
      "parents": [
        "aa8673599f1d269b4e4d9b0c0f61fca57bc02699"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Tue Apr 12 13:39:14 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 12 13:39:14 2011 -0700"
      },
      "message": "bridge: reset IPCB in br_parse_ip_options\n\nCommit 462fb2af9788a82 (bridge : Sanitize skb before it enters the IP\nstack), missed one IPCB init before calling ip_options_compile()\n\nThanks to Scot Doyle for his tests and bug reports.\n\nReported-by: Scot Doyle \u003clkml@scotdoyle.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nCc: Hiroaki SHIMODA \u003cshimoda.hiroaki@gmail.com\u003e\nAcked-by: Bandan Das \u003cbandan.das@stratus.com\u003e\nAcked-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nCc: Jan Lübbe \u003cjluebbe@debian.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "aa8673599f1d269b4e4d9b0c0f61fca57bc02699",
      "tree": "7733bac39d382cfcda0459e8973decb300a0c52a",
      "parents": [
        "4a9f65f6304a00f6473e83b19c1e83caa1e42530"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 11 18:59:05 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 11 18:59:05 2011 -0700"
      },
      "message": "llc: Fix length check in llc_fixup_skb().\n\nFixes bugzilla #32872\n\nThe LLC stack pretends to support non-linear skbs but there is a\ndirect use of skb_tail_pointer() in llc_fixup_skb().\n\nUse pskb_may_pull() to see if data_size bytes remain and can be\naccessed linearly in the packet, instead of direct pointer checks.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4a9f65f6304a00f6473e83b19c1e83caa1e42530",
      "tree": "126371158cd2361291027c22690d9761d8e22372",
      "parents": [
        "0c184ed9032c58b21f0d90de28c796874b73d6a1"
      ],
      "author": {
        "name": "Sjur Brændeland",
        "email": "sjur.brandeland@stericsson.com",
        "time": "Mon Apr 11 10:11:30 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 11 13:15:58 2011 -0700"
      },
      "message": "caif: performance bugfix - allow radio stack to prioritize packets.\n\n    In the CAIF Payload message the Packet Type indication must be set to\n    UNCLASSIFIED in order to allow packet prioritization in the modem\u0027s\n    network stack. Otherwise TCP-Ack is not prioritized in the modems\n    transmit queue.\n\nSigned-off-by: Sjur Brændeland \u003csjur.brandeland@stericsson.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0c184ed9032c58b21f0d90de28c796874b73d6a1",
      "tree": "149921e54ad64675e7bcc98bba639093ca752931",
      "parents": [
        "c968bdf6912cad6d0fc63d7037cc1c870604a808"
      ],
      "author": {
        "name": "Sjur Brændeland",
        "email": "sjur.brandeland@stericsson.com",
        "time": "Mon Apr 11 10:11:29 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 11 13:15:57 2011 -0700"
      },
      "message": "caif: Bugfix use for_each_safe when removing list nodes.\n\nSigned-off-by: Sjur Brændeland \u003csjur.brandeland@stericsson.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c44eaf41a5a423993932c9a9ad279ee132779b48",
      "tree": "3554fc0bfdcd97936417d6d001d00710d11e67e5",
      "parents": [
        "4263a2f1dad8c8e7ce2352a0cbc882c2b0c044a9",
        "88edaa415966af965bb7eb7056d8b58145462c8e"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Apr 11 07:27:24 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Apr 11 07:27:24 2011 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (34 commits)\n  net: Add support for SMSC LAN9530, LAN9730 and LAN89530\n  mlx4_en: Restoring RX buffer pointer in case of failure\n  mlx4: Sensing link type at device initialization\n  ipv4: Fix \"Set rt-\u003ert_iif more sanely on output routes.\"\n  MAINTAINERS: add entry for Xen network backend\n  be2net: Fix suspend/resume operation\n  be2net: Rename some struct members for clarity\n  pppoe: drop PPPOX_ZOMBIEs in pppoe_flush_dev\n  dsa/mv88e6131: add support for mv88e6085 switch\n  ipv6: Enable RFS sk_rxhash tracking for ipv6 sockets (v2)\n  be2net: Fix a potential crash during shutdown.\n  bna: Fix for handling firmware heartbeat failure\n  can: mcp251x: Allow pass IRQ flags through platform data.\n  smsc911x: fix mac_lock acquision before calling smsc911x_mac_read\n  iwlwifi: accept EEPROM version 0x423 for iwl6000\n  rt2x00: fix cancelling uninitialized work\n  rtlwifi: Fix some warnings/bugs\n  p54usb: IDs for two new devices\n  wl12xx: fix potential buffer overflow in testmode nvs push\n  zd1211rw: reset rx idle timer from tasklet\n  ...\n"
    },
    {
      "commit": "94c8a984ae2adbd9a9626fb42e0f2faf3e36e86f",
      "tree": "a4beddd64501ef00ad41c8fd5974340bec2fcf73",
      "parents": [
        "f9fa0bc1fabe1d861e46d80ecbe7e85da359195c",
        "37adb89fadd65ce47f7e5cfd564938a76b351948"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Apr 08 11:47:35 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Apr 08 11:47:35 2011 -0700"
      },
      "message": "Merge branch \u0027bugfixes\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6\n\n* \u0027bugfixes\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6:\n  NFS: Change initial mount authflavor only when server returns NFS4ERR_WRONGSEC\n  NFS: Fix a signed vs. unsigned secinfo bug\n  Revert \"net/sunrpc: Use static const char arrays\"\n"
    },
    {
      "commit": "1b86a58f9d7ce4fe2377687f378fbfb53bdc9b6c",
      "tree": "e931b86166c2a644470e3754e2d3139f97834951",
      "parents": [
        "9b57e1a79e2142df8412ab223c90ba6f47c6b3a3"
      ],
      "author": {
        "name": "OGAWA Hirofumi",
        "email": "hirofumi@mail.parknet.co.jp",
        "time": "Thu Apr 07 14:04:08 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 07 14:04:08 2011 -0700"
      },
      "message": "ipv4: Fix \"Set rt-\u003ert_iif more sanely on output routes.\"\n\nCommit 1018b5c01636c7c6bda31a719bda34fc631db29a (\"Set rt-\u003ert_iif more\nsanely on output routes.\")  breaks rt_is_{output,input}_route.\n\nThis became the cause to return \"IP_PKTINFO\u0027s -\u003eipi_ifindex \u003d\u003d 0\".\n\nTo fix it, this does:\n\n1) Add \"int rt_route_iif;\" to struct rtable\n\n2) For input routes, always set rt_route_iif to same value as rt_iif\n\n3) For output routes, always set rt_route_iif to zero.  Set rt_iif\n   as it is done currently.\n\n4) Change rt_is_{output,input}_route() to test rt_route_iif\n\nSigned-off-by: OGAWA Hirofumi \u003chirofumi@mail.parknet.co.jp\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "42933bac11e811f02200c944d8562a15f8ec4ff0",
      "tree": "fcdd9afe56eb0e746565ddd1f92f22d36678b843",
      "parents": [
        "2b9accbee563f535046ff2cd382d0acaa92e130c",
        "25985edcedea6396277003854657b5f3cb31a628"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Apr 07 11:14:49 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Apr 07 11:14:49 2011 -0700"
      },
      "message": "Merge branch \u0027for-linus2\u0027 of git://git.profusion.mobi/users/lucas/linux-2.6\n\n* \u0027for-linus2\u0027 of git://git.profusion.mobi/users/lucas/linux-2.6:\n  Fix common misspellings\n"
    },
    {
      "commit": "a25a32ab71f822efb3e6025c365caa678aa6ff3b",
      "tree": "fcbc495baddf6d1837034cb83ee837887ea648f6",
      "parents": [
        "ec80bfcb68a0c46443991991d459a0cde773cdea",
        "3d7dc7e8c1566acb0fc55df228b2ed91f5638e9d"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 06 13:34:15 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 06 13:34:15 2011 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "ec80bfcb68a0c46443991991d459a0cde773cdea",
      "tree": "fe4e35db09c18c44b89b55189aa4594218b5fff4",
      "parents": [
        "47482f132a689af168fae3055ff1899dfd032d3a"
      ],
      "author": {
        "name": "Peter Korsgaard",
        "email": "jacmet@sunsite.dk",
        "time": "Tue Apr 05 03:03:56 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 06 13:32:53 2011 -0700"
      },
      "message": "dsa/mv88e6131: add support for mv88e6085 switch\n\nThe mv88e6085 is identical to the mv88e6095, except that all ports are\n10/100 Mb/s, so use the existing setup code except for the cpu/dsa speed\nselection in _setup_port().\n\nSigned-off-by: Peter Korsgaard \u003cjacmet@sunsite.dk\u003e\nAcked-by: Lennert Buytenhek \u003cbuytenh@wantstofly.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "47482f132a689af168fae3055ff1899dfd032d3a",
      "tree": "07f64d971a4783a71b612602da42e7faf8b14dd5",
      "parents": [
        "2d5d4154650459b61a8e7097d186a89d89dab8ed"
      ],
      "author": {
        "name": "Neil Horman",
        "email": "nhorman@tuxdriver.com",
        "time": "Wed Apr 06 13:07:09 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 06 13:07:09 2011 -0700"
      },
      "message": "ipv6: Enable RFS sk_rxhash tracking for ipv6 sockets (v2)\n\nproperly record sk_rxhash in ipv6 sockets (v2)\n\nNoticed while working on another project that flows to sockets which I had open\non a test systems weren\u0027t getting steered properly when I had RFS enabled.\nLooking more closely I found that:\n\n1) The affected sockets were all ipv6\n2) They weren\u0027t getting steered because sk-\u003esk_rxhash was never set from the\nincomming skbs on that socket.\n\nThis was occuring because there are several points in the IPv4 tcp and udp code\nwhich save the rxhash value when a new connection is established.  Those calls\nto sock_rps_save_rxhash were never added to the corresponding ipv6 code paths.\nThis patch adds those calls.  Tested by myself to properly enable RFS\nfunctionalty on ipv6.\n\nChange notes:\nv2:\n\tFiltered UDP to only arm RFS on bound sockets (Eric Dumazet)\n\nSigned-off-by: Neil Horman \u003cnhorman@tuxdriver.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0867659fa3c245bf203d837a82e0f6ea5079c2c5",
      "tree": "b4055632e89463046fd32ba20d3a691fd798da95",
      "parents": [
        "6221f222c0ebf1acdf7abcf927178f40e1a65e2a"
      ],
      "author": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Wed Apr 06 10:13:32 2011 -0700"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Wed Apr 06 11:18:17 2011 -0700"
      },
      "message": "Revert \"net/sunrpc: Use static const char arrays\"\n\nThis reverts commit 411b5e05617593efebc06241dbc56f42150f2abe.\n\nOlga Kornievskaia reports:\n\nProblem: linux client mounting linux server using rc4-hmac-md5\nenctype. gssd fails with create a context after receiving a reply from\nthe server.\n\nDiagnose: putting printout statements in the server kernel and\nkerberos libraries revealed that client and server derived different\nintegrity keys.\n\nServer kernel code was at fault due the the commit\n\n[aglo@skydive linux-pnfs]$ git show 411b5e05617593efebc06241dbc56f42150f2abe\n\nTrond: The problem is that since it relies on virt_to_page(), you cannot\ncall sg_set_buf() for data in the const section.\n\nReported-by: Olga Kornievskaia \u003caglo@citi.umich.edu\u003e\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\nCc: stable@kernel.org\t[2.6.36+]\n"
    },
    {
      "commit": "9d9305949778c41b92d4394a2f2a6bcdb1c41a9c",
      "tree": "d49d536ae8156ad9989dc7b26e3897f21e549b02",
      "parents": [
        "738faca34335cd1d5d87fa7c58703139c7fa15bd",
        "96120d86fe302c006259baee9061eea9e1b9e486"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 05 14:21:11 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 05 14:21:11 2011 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6\n"
    },
    {
      "commit": "d14f5b810b49c7dbd1a01be1c6d3641d46090080",
      "tree": "b201a1cf14c455b919ecb7d4a6631134d5815703",
      "parents": [
        "b2a8b4b81966094703088a7bc76a313af841924d",
        "738faca34335cd1d5d87fa7c58703139c7fa15bd"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 05 12:26:57 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 05 12:26:57 2011 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (27 commits)\n  ipv6: Don\u0027t pass invalid dst_entry pointer to dst_release().\n  mlx4: fix kfree on error path in new_steering_entry()\n  tcp: len check is unnecessarily devastating, change to WARN_ON\n  sctp: malloc enough room for asconf-ack chunk\n  sctp: fix auth_hmacs field\u0027s length of struct sctp_cookie\n  net: Fix dev dev_ethtool_get_rx_csum() for forced NETIF_F_RXCSUM\n  usbnet: use eth%d name for known ethernet devices\n  starfire: clean up dma_addr_t size test\n  iwlegacy: fix bugs in change_interface\n  carl9170: Fix tx aggregation problems with some clients\n  iwl3945: disable hw scan by default\n  wireless: rt2x00: rt2800usb.c add and identify ids\n  iwl3945: do not deprecate software scan\n  mac80211: fix aggregation frame release during timeout\n  cfg80211: fix BSS double-unlinking (continued)\n  cfg80211:: fix possible NULL pointer dereference\n  mac80211: fix possible NULL pointer dereference\n  mac80211: fix NULL pointer dereference in ieee80211_key_alloc()\n  ath9k: fix a chip wakeup related crash in ath9k_start\n  mac80211: fix a crash in minstrel_ht in HT mode with no supported MCS rates\n  ...\n"
    },
    {
      "commit": "738faca34335cd1d5d87fa7c58703139c7fa15bd",
      "tree": "983fc8212bc5828fe14541119783cff159508b58",
      "parents": [
        "a14b289d4614bb3b25d0455d68f72f3c7b4cc8e8"
      ],
      "author": {
        "name": "Boris Ostrovsky",
        "email": "boris.ostrovsky@amd.com",
        "time": "Mon Apr 04 13:07:26 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 04 13:07:26 2011 -0700"
      },
      "message": "ipv6: Don\u0027t pass invalid dst_entry pointer to dst_release().\n\nMake sure dst_release() is not called with error pointer. This is\nsimilar to commit 4910ac6c526d2868adcb5893e0c428473de862b5 (\"ipv4:\nDon\u0027t ip_rt_put() an error pointer in RAW sockets.\").\n\nSigned-off-by: Boris Ostrovsky \u003cboris.ostrovsky@amd.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fcf8bd3ba5362682f945a3f838070ac5e10ff871",
      "tree": "8c3c05ff4bb73bf05de06d050e3173b724e005ae",
      "parents": [
        "5312c3f60ba49073081b2dc421f9f3c22dd43d99"
      ],
      "author": {
        "name": "Helmut Schaa",
        "email": "helmut.schaa@googlemail.com",
        "time": "Fri Apr 01 15:46:05 2011 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Apr 04 15:22:11 2011 -0400"
      },
      "message": "mac80211: Fix duplicate frames on cooked monitor\n\nCleaning the ieee80211_rx_data.flags field here is wrong, instead the\nflags should be valid accross processing the frame on different\ninterfaces. Fix this by removing the incorrect flags\u003d0 assignment.\n\nIntroduced in commit 554891e63a29af35cc6bb403ef34e319518114d0\n(mac80211: move packet flags into packet).\n\nSigned-off-by: Helmut Schaa \u003chelmut.schaa@googlemail.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "96120d86fe302c006259baee9061eea9e1b9e486",
      "tree": "2fa6e56f389431dfb84609d3d7572cad76e88e71",
      "parents": [
        "b7225041e93f81e7e38fcdf27fc82044e7695efd"
      ],
      "author": {
        "name": "Florian Westphal",
        "email": "fw@strlen.de",
        "time": "Mon Apr 04 17:06:21 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 17:06:21 2011 +0200"
      },
      "message": "netfilter: xt_conntrack: fix inverted conntrack direction test\n\n--ctdir ORIGINAL matches REPLY packets, and vv:\n\nuserspace sets \"invert_flags \u0026\u003d ~XT_CONNTRACK_DIRECTION\" in ORIGINAL\ncase.\n\nThus: (CTINFO2DIR(ctinfo) \u003d\u003d IP_CT_DIR_ORIGINAL) ^\n      !!(info-\u003einvert_flags \u0026 XT_CONNTRACK_DIRECTION))\n\nyields \"1 ^ 0\", which is true -\u003e returns false.\n\nReproducer:\niptables -I OUTPUT 1 -p tcp --syn -m conntrack --ctdir ORIGINAL\n\nSigned-off-by: Florian Westphal \u003cfwestphal@astaro.com\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "b7225041e93f81e7e38fcdf27fc82044e7695efd",
      "tree": "75291a5f780d4032f6076a628aab6266196bb59b",
      "parents": [
        "0fae2e7740aca7e384c5f337f458897e7e337d58"
      ],
      "author": {
        "name": "Florian Westphal",
        "email": "fw@strlen.de",
        "time": "Mon Apr 04 17:01:43 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 17:01:43 2011 +0200"
      },
      "message": "netfilter: xt_addrtype: replace rt6_lookup with nf_afinfo-\u003eroute\n\nThis avoids pulling in the ipv6 module when using (ipv4-only) iptables\n-m addrtype.\n\nSigned-off-by: Florian Westphal \u003cfw@strlen.de\u003e\nAcked-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "0fae2e7740aca7e384c5f337f458897e7e337d58",
      "tree": "ff0767f2dc382ee8a62e324e441b671382f0433c",
      "parents": [
        "31ad3dd64e689bc79dd819f8f134b9b025240eb8"
      ],
      "author": {
        "name": "Florian Westphal",
        "email": "fw@strlen.de",
        "time": "Mon Apr 04 17:00:54 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 17:00:54 2011 +0200"
      },
      "message": "netfilter: af_info: add \u0027strict\u0027 parameter to limit lookup to .oif\n\nipv6 fib lookup can set RT6_LOOKUP_F_IFACE flag to restrict search\nto an interface, but this flag cannot be set via struct flowi.\n\nAlso, it cannot be set via ip6_route_output: this function uses the\npassed sock struct to determine if this flag is required\n(by testing for nonzero sk_bound_dev_if).\n\nWork around this by passing in an artificial struct sk in case\n\u0027strict\u0027 argument is true.\n\nThis is required to replace the rt6_lookup call in xt_addrtype.c with\nnf_afinfo-\u003eroute().\n\nSigned-off-by: Florian Westphal \u003cfw@strlen.de\u003e\nAcked-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "31ad3dd64e689bc79dd819f8f134b9b025240eb8",
      "tree": "06d2a9afbea2b1b7973e416f18d4588df30fb91a",
      "parents": [
        "a09d19779f3ffac6e16821accc2c1cc4df1b643a"
      ],
      "author": {
        "name": "Florian Westphal",
        "email": "fw@strlen.de",
        "time": "Mon Apr 04 16:56:29 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 16:56:29 2011 +0200"
      },
      "message": "netfilter: af_info: add network namespace parameter to route hook\n\nThis is required to eventually replace the rt6_lookup call in\nxt_addrtype.c with nf_afinfo-\u003eroute().\n\nSigned-off-by: Florian Westphal \u003cfw@strlen.de\u003e\nAcked-by: David S. Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "a09d19779f3ffac6e16821accc2c1cc4df1b643a",
      "tree": "26ae50dcffd19813b21f3cacb9a11a1908dcf3f0",
      "parents": [
        "b4232a22776aa5d063f890d21ca69870dbbe431b"
      ],
      "author": {
        "name": "Hans Schillstrom",
        "email": "hans.schillstrom@ericsson.com",
        "time": "Mon Apr 04 15:25:18 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 15:25:18 2011 +0200"
      },
      "message": "IPVS: fix NULL ptr dereference in ip_vs_ctl.c ip_vs_genl_dump_daemons()\n\nipvsadm -ln --daemon will trigger a Null pointer exception because\nip_vs_genl_dump_daemons() uses skb_net() instead of skb_sknet().\n\nTo prevent others from NULL ptr a check is made in ip_vs.h skb_net().\n\nSigned-off-by: Hans Schillstrom \u003chans.schillstrom@ericsson.com\u003e\nSigned-off-by: Simon Horman \u003chorms@verge.net.au\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "b4232a22776aa5d063f890d21ca69870dbbe431b",
      "tree": "81bcb79f87d7a36f37f347ef4c4ad95dc8678156",
      "parents": [
        "2f9f28b212a2bd4948c8ceaaec33ce0123632129"
      ],
      "author": {
        "name": "David Sterba",
        "email": "dsterba@suse.cz",
        "time": "Mon Apr 04 15:21:02 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 15:21:02 2011 +0200"
      },
      "message": "netfilter: h323: bug in parsing of ASN1 SEQOF field\n\nStatic analyzer of clang found a dead store which appears to be a bug in\nreading count of items in SEQOF field, only the lower byte of word is\nstored. This may lead to corrupted read and communication shutdown.\n\nThe bug has been in the module since it\u0027s first inclusion into linux\nkernel.\n\n[Patrick: the bug is real, but without practical consequence since the\n largest amount of sequence-of members we parse is 30.]\n\nSigned-off-by: David Sterba \u003cdsterba@suse.cz\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "2f9f28b212a2bd4948c8ceaaec33ce0123632129",
      "tree": "8c9961f59a190ab05a568216d69f4809ab3041e2",
      "parents": [
        "512d06b5b64fb422d90f199b1be188082729edf9"
      ],
      "author": {
        "name": "Jozsef Kadlecsik",
        "email": "kadlec@blackhole.kfki.hu",
        "time": "Mon Apr 04 15:19:25 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 15:19:25 2011 +0200"
      },
      "message": "netfilter: ipset: references are protected by rwlock instead of mutex\n\nThe timeout variant of the list:set type must reference the member sets.\nHowever, its garbage collector runs at timer interrupt so the mutex\nprotection of the references is a no go. Therefore the reference protection\nis converted to rwlock.\n\nSigned-off-by: Jozsef Kadlecsik \u003ckadlec@blackhole.kfki.hu\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "512d06b5b64fb422d90f199b1be188082729edf9",
      "tree": "a8faf8b7023094414e3bbcc05b2eb7960af54f42",
      "parents": [
        "4dd5ffe4fc36128dc86568ddeaeae359e6037762"
      ],
      "author": {
        "name": "Jozsef Kadlecsik",
        "email": "kadlec@blackhole.kfki.hu",
        "time": "Mon Apr 04 15:18:45 2011 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 04 15:18:45 2011 +0200"
      },
      "message": "netfilter: ipset: list:set timeout variant fixes\n\n- the timeout value was actually not set\n- the garbage collector was broken\n\nThe variant is fixed, the tests to the ipset testsuite are added.\n\nSigned-off-by: Jozsef Kadlecsik \u003ckadlec@blackhole.kfki.hu\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "2fceec13375e5d98ef033c6b0ee03943fc460950",
      "tree": "34870f61085509c0ff3d8cef819846fc31e94e7c",
      "parents": [
        "2cab86bee8e7f353e6ac8c15b3eb906643497644"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Fri Apr 01 21:47:41 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Apr 01 21:47:41 2011 -0700"
      },
      "message": "tcp: len check is unnecessarily devastating, change to WARN_ON\n\nAll callers are prepared for alloc failures anyway, so this error\ncan safely be boomeranged to the callers domain without super\nbad consequences. ...At worst the connection might go into a state\nwhere each RTO tries to (unsuccessfully) re-fragment with such\na mis-sized value and eventually dies.\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2cab86bee8e7f353e6ac8c15b3eb906643497644",
      "tree": "8b65b48f5b32d3e6a60e97674f4b21be24f840a6",
      "parents": [
        "028dba0ac3fc3c82da06110b011fce22a5ffad00"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Thu Mar 31 23:42:55 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Apr 01 21:45:51 2011 -0700"
      },
      "message": "sctp: malloc enough room for asconf-ack chunk\n\nSometime the ASCONF_ACK parameters can equal to the fourfold of\nASCONF parameters, this only happend in some special case:\n\n  ASCONF parameter is :\n    Unrecognized Parameter (4 bytes)\n  ASCONF_ACK parameter should be:\n    Error Cause Indication parameter (8 bytes header)\n     + Error Cause (4 bytes header)\n       + Unrecognized Parameter (4bytes)\n\nFour 4bytes Unrecognized Parameters in ASCONF chunk will cause panic.\n\nPid: 0, comm: swapper Not tainted 2.6.38-next+ #22 Bochs Bochs\nEIP: 0060:[\u003cc0717eae\u003e] EFLAGS: 00010246 CPU: 0\nEIP is at skb_put+0x60/0x70\nEAX: 00000077 EBX: c09060e2 ECX: dec1dc30 EDX: c09469c0\nESI: 00000000 EDI: de3c8d40 EBP: dec1dc58 ESP: dec1dc2c\n DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068\nProcess swapper (pid: 0, ti\u003ddec1c000 task\u003dc09aef20 task.ti\u003dc0980000)\nStack:\n c09469c0 e1894fa4 00000044 00000004 de3c8d00 de3c8d00 de3c8d44 de3c8d40\n c09060e2 de25dd80 de3c8d40 dec1dc7c e1894fa4 dec1dcb0 00000040 00000004\n 00000000 00000800 00000004 00000004 dec1dce0 e1895a2b dec1dcb4 de25d960\nCall Trace:\n [\u003ce1894fa4\u003e] ? sctp_addto_chunk+0x4e/0x89 [sctp]\n [\u003ce1894fa4\u003e] sctp_addto_chunk+0x4e/0x89 [sctp]\n [\u003ce1895a2b\u003e] sctp_process_asconf+0x32f/0x3d1 [sctp]\n [\u003ce188d554\u003e] sctp_sf_do_asconf+0xf8/0x173 [sctp]\n [\u003ce1890b02\u003e] sctp_do_sm+0xb8/0x159 [sctp]\n [\u003ce18a2248\u003e] ? sctp_cname+0x0/0x52 [sctp]\n [\u003ce189392d\u003e] sctp_assoc_bh_rcv+0xac/0xe3 [sctp]\n [\u003ce1897d76\u003e] sctp_inq_push+0x2d/0x30 [sctp]\n [\u003ce18a21b2\u003e] sctp_rcv+0x7a7/0x83d [sctp]\n [\u003cc077a95c\u003e] ? ipv4_confirm+0x118/0x125\n [\u003cc073a970\u003e] ? nf_iterate+0x34/0x62\n [\u003cc074789d\u003e] ? ip_local_deliver_finish+0x0/0x194\n [\u003cc074789d\u003e] ? ip_local_deliver_finish+0x0/0x194\n [\u003cc0747992\u003e] ip_local_deliver_finish+0xf5/0x194\n [\u003cc074789d\u003e] ? ip_local_deliver_finish+0x0/0x194\n [\u003cc0747a6e\u003e] NF_HOOK.clone.1+0x3d/0x44\n [\u003cc0747ab3\u003e] ip_local_deliver+0x3e/0x44\n [\u003cc074789d\u003e] ? ip_local_deliver_finish+0x0/0x194\n [\u003cc074775c\u003e] ip_rcv_finish+0x29f/0x2c7\n [\u003cc07474bd\u003e] ? ip_rcv_finish+0x0/0x2c7\n [\u003cc0747a6e\u003e] NF_HOOK.clone.1+0x3d/0x44\n [\u003cc0747cae\u003e] ip_rcv+0x1f5/0x233\n [\u003cc07474bd\u003e] ? ip_rcv_finish+0x0/0x2c7\n [\u003cc071dce3\u003e] __netif_receive_skb+0x310/0x336\n [\u003cc07221f3\u003e] netif_receive_skb+0x4b/0x51\n [\u003ce0a4ed3d\u003e] cp_rx_poll+0x1e7/0x29c [8139cp]\n [\u003cc072275e\u003e] net_rx_action+0x65/0x13a\n [\u003cc0445a54\u003e] __do_softirq+0xa1/0x149\n [\u003cc04459b3\u003e] ? __do_softirq+0x0/0x149\n \u003cIRQ\u003e\n [\u003cc0445891\u003e] ? irq_exit+0x37/0x72\n [\u003cc040a7e9\u003e] ? do_IRQ+0x81/0x95\n [\u003cc07b3670\u003e] ? common_interrupt+0x30/0x38\n [\u003cc0428058\u003e] ? native_safe_halt+0xa/0xc\n [\u003cc040f5d7\u003e] ? default_idle+0x58/0x92\n [\u003cc0408fb0\u003e] ? cpu_idle+0x96/0xb2\n [\u003cc0797989\u003e] ? rest_init+0x5d/0x5f\n [\u003cc09fd90c\u003e] ? start_kernel+0x34b/0x350\n [\u003cc09fd0cb\u003e] ? i386_start_kernel+0xba/0xc1\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5e58e5283a0a0a99ee970e7e5c80c6541693376e",
      "tree": "40409bad22ddc6c37b23ae8e518bbd6b2f39007c",
      "parents": [
        "c100c8f4c3c6f2a407bdbaaad2c4f1062e6a473a",
        "ffd8c746fbef50cf12df239f9d23c2afe1a2c3cb"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Apr 01 17:15:25 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Apr 01 17:15:25 2011 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "84daeb09ef2b11cb0b29e100766e38e206c8bc47",
      "tree": "c89748e1bb8618aac7ad0d2079fba43543844483",
      "parents": [
        "ecb78ab6f30106ab72a575a25b1cdfd1633b7ca2",
        "c100c8f4c3c6f2a407bdbaaad2c4f1062e6a473a"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Apr 01 08:53:50 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Apr 01 08:53:50 2011 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6:\n  appletalk: Fix OOPS in atalk_release().\n  mlx4: Fixing bad size of event queue buffer\n  mlx4: Fixing use after free\n  bonding:typo in comment\n  sctp: Pass __GFP_NOWARN to hash table allocation attempts.\n  connector: convert to synchronous netlink message processing\n  fib: add rtnl locking in ip_fib_net_exit\n  atm/solos-pci: Don\u0027t flap VCs when carrier state changes\n  atm/solos-pci: Don\u0027t include frame pseudo-header on transmit hex-dump\n  atm/solos-pci: Use VPI.VCI notation uniformly.\n  Atheros, atl2: Fix mem leaks in error paths of atl2_set_eeprom\n  netdev: fix mtu check when TSO is enabled\n  net/usb: Ethernet quirks for the LG-VL600 4G modem\n  phylib: phy_attach_direct: phy_init_hw can fail, add cleanup\n  bridge: mcast snooping, fix length check of snooped MLDv1/2\n  via-ircc: Pass PCI device pointer to dma_{alloc, free}_coherent()\n  via-ircc: Use pci_{get, set}_drvdata() instead of static pointer variable\n  net: gre: provide multicast mappings for ipv4 and ipv6\n  bridge: Fix compilation warning in function br_stp_recalculate_bridge_id()\n  net: Fix warnings caused by MAX_SKB_FRAGS change.\n"
    },
    {
      "commit": "c100c8f4c3c6f2a407bdbaaad2c4f1062e6a473a",
      "tree": "bc4075ba65a4187ca46642589f5299cde399ae22",
      "parents": [
        "c37947459172a02691ccd48cb967e8b605d38c56"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 31 18:59:10 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 31 18:59:10 2011 -0700"
      },
      "message": "appletalk: Fix OOPS in atalk_release().\n\nCommit 60d9f461a20ba59219fdcdc30cbf8e3a4ad3f625 (\"appletalk: remove\nthe BKL\") added a dereference of \"sk\" before checking for NULL in\natalk_release().\n\nGuard the code block completely, rather than partially, with the\nNULL check.\n\nReported-by: Dave Jones \u003cdavej@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "25985edcedea6396277003854657b5f3cb31a628",
      "tree": "f026e810210a2ee7290caeb737c23cb6472b7c38",
      "parents": [
        "6aba74f2791287ec407e0f92487a725a25908067"
      ],
      "author": {
        "name": "Lucas De Marchi",
        "email": "lucas.demarchi@profusion.mobi",
        "time": "Wed Mar 30 22:57:33 2011 -0300"
      },
      "committer": {
        "name": "Lucas De Marchi",
        "email": "lucas.demarchi@profusion.mobi",
        "time": "Thu Mar 31 11:26:23 2011 -0300"
      },
      "message": "Fix common misspellings\n\nFixes generated by \u0027codespell\u0027 and manually reviewed.\n\nSigned-off-by: Lucas De Marchi \u003clucas.demarchi@profusion.mobi\u003e\n"
    },
    {
      "commit": "a84b50ceb7d640437d0dc28a2bef0d0de054de89",
      "tree": "e16a02b6be682dd9c3560fe7639331d1f1d62fa1",
      "parents": [
        "04f482faf50535229a5a5c8d629cf963899f857c"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 30 17:51:36 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 30 17:51:36 2011 -0700"
      },
      "message": "sctp: Pass __GFP_NOWARN to hash table allocation attempts.\n\nLike DCCP and other similar pieces of code, there are mechanisms\nhere to try allocating smaller hash tables if the allocation\nfails.  So pass in __GFP_NOWARN like the others do instead of\nemitting a scary message.\n\nReported-by: Dave Jones \u003cdavej@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e2666f84958adb3a034b98e99699b55705117e01",
      "tree": "f8fdca8163bf15d98468c63d4d98932ded0ec96f",
      "parents": [
        "c031235b395433350f25943b7580a5e343c7b7b2"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed Mar 30 16:57:46 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 30 16:57:46 2011 -0700"
      },
      "message": "fib: add rtnl locking in ip_fib_net_exit\n\nDaniel J Blueman reported a lockdep splat in trie_firstleaf(), caused by\nRTNL being not locked before a call to fib_table_flush()\n\nReported-by: Daniel J Blueman \u003cdaniel.blueman@gmail.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c031235b395433350f25943b7580a5e343c7b7b2",
      "tree": "2b00c05104439e9a8bbf6d521b649f2138945b80",
      "parents": [
        "18b429e74eeafe42e947b1b0f9a760c7153a0b5c"
      ],
      "author": {
        "name": "Philip A. Prindeville",
        "email": "philipp@redfish-solutions.com",
        "time": "Wed Mar 30 13:17:04 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 30 16:53:38 2011 -0700"
      },
      "message": "atm/solos-pci: Don\u0027t flap VCs when carrier state changes\n\nDon\u0027t flap VCs when carrier state changes; higher-level protocols\ncan detect loss of connectivity and act accordingly. This is more\nconsistent with how other network interfaces work.\n\nWe no longer use release_vccs() so we can delete it.\n\nrelease_vccs() was duplicated from net/atm/common.c; make the\ncorresponding function exported, since other code duplicates it\nand could leverage it if it were public.\n\nSigned-off-by: Philip A. Prindeville \u003cphilipp@redfish-solutions.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "50f3515828024582402044bcced6804c070c491c",
      "tree": "f9cf25bee56d0ca54acf4d571536268774dc56ed",
      "parents": [
        "6aba74f2791287ec407e0f92487a725a25908067",
        "4b2a58abd1e17c0ee53c8dded879e015917cca67"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Mar 30 09:46:09 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Mar 30 09:46:09 2011 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/sage/ceph-client\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/sage/ceph-client:\n  libceph: Create a new key type \"ceph\".\n  libceph: Get secret from the kernel keys api when mounting with key\u003dNAME.\n  ceph: Move secret key parsing earlier.\n  libceph: fix null dereference when unregistering linger requests\n  ceph: unlock on error in ceph_osdc_start_request()\n  ceph: fix possible NULL pointer dereference\n  ceph: flush msgr_wq during mds_client shutdown\n"
    },
    {
      "commit": "79b569f0ec53a14c4d71e79d93a8676d9a0fda6d",
      "tree": "7e58567e6d8451ed8981afa687d67b69ae33a52e",
      "parents": [
        "7a635ea989991d7f12d57a12f2ba7cb6d211e083"
      ],
      "author": {
        "name": "Daniel Lezcano",
        "email": "daniel.lezcano@free.fr",
        "time": "Wed Mar 30 02:42:17 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 30 02:42:17 2011 -0700"
      },
      "message": "netdev: fix mtu check when TSO is enabled\n\nIn case the device where is coming from the packet has TSO enabled,\nwe should not check the mtu size value as this one could be bigger\nthan the expected value.\n\nThis is the case for the macvlan driver when the lower device has\nTSO enabled. The macvlan inherit this feature and forward the packets\nwithout fragmenting them. Then the packets go through dev_forward_skb\nand are dropped. This patch fix this by checking TSO is not enabled\nwhen we want to check the mtu size.\n\nSigned-off-by: Daniel Lezcano \u003cdaniel.lezcano@free.fr\u003e\nAcked-by: \"Eric W. Biederman\" \u003cebiederm@xmission.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ff9a57a62afbbe2d0f3a09af321f1fd7645f38a5",
      "tree": "74a3d7cf9a7b10ad042eccf6adacf30aae8c7c15",
      "parents": [
        "fd1d9188f2cb81fe63c789d9f5463dca402ade12"
      ],
      "author": {
        "name": "Linus Lüssing",
        "email": "linus.luessing@web.de",
        "time": "Sat Mar 26 20:27:24 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 30 02:28:20 2011 -0700"
      },
      "message": "bridge: mcast snooping, fix length check of snooped MLDv1/2\n\n\"len \u003d ntohs(ip6h-\u003epayload_len)\" does not include the length of the ipv6\nheader itself, which the rest of this function assumes, though.\n\nThis leads to a length check less restrictive as it should be in the\nfollowing line for one thing. For another, it very likely leads to an\ninteger underrun when substracting the offset and therefore to a very\nhigh new value of \u0027len\u0027 due to its unsignedness. This will ultimately\nlead to the pskb_trim_rcsum() practically never being called, even in\nthe cases where it should.\n\nSigned-off-by: Linus Lüssing \u003clinus.luessing@web.de\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "93ca3bb5df9bc8b2c60485e1cc6507c3d7c8e1fa",
      "tree": "6ccf21f8d1e4431c6be79c265fb1f9a722308f63",
      "parents": [
        "1459a3cc51d90d78027c7b5c1790e5d22751c8eb"
      ],
      "author": {
        "name": "Timo Teräs",
        "email": "timo.teras@iki.fi",
        "time": "Mon Mar 28 22:40:53 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 30 00:10:47 2011 -0700"
      },
      "message": "net: gre: provide multicast mappings for ipv4 and ipv6\n\nMy commit 6d55cb91a0020ac0 (gre: fix hard header destination\naddress checking) broke multicast.\n\nThe reason is that ip_gre used to get ipgre_header() calls with\nzero destination if we have NOARP or multicast destination. Instead\nthe actual target was decided at ipgre_tunnel_xmit() time based on\nper-protocol dissection.\n\nInstead of allowing the \"abuse\" of -\u003eheader() calls with invalid\ndestination, this creates multicast mappings for ip_gre. This also\nfixes \"ip neigh show nud noarp\" to display the proper multicast\nmappings used by the gre device.\n\nReported-by: Doug Kehn \u003crdkehn@yahoo.com\u003e\nSigned-off-by: Timo Teräs \u003ctimo.teras@iki.fi\u003e\nAcked-by: Doug Kehn \u003crdkehn@yahoo.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1459a3cc51d90d78027c7b5c1790e5d22751c8eb",
      "tree": "c8c1f1a12c0001e55ed27f904dcef490040bd4ab",
      "parents": [
        "eec009548e98f6b6d514ff5bb8a8627b8dd17a49"
      ],
      "author": {
        "name": "Balaji G",
        "email": "balajig81@gmail.com",
        "time": "Tue Mar 29 06:20:04 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Mar 29 23:37:23 2011 -0700"
      },
      "message": "bridge: Fix compilation warning in function br_stp_recalculate_bridge_id()\n\nnet/bridge/br_stp_if.c: In function ‘br_stp_recalculate_bridge_id’:\nnet/bridge/br_stp_if.c:216:3: warning: ‘return’ with no value, in function returning non-void\n\nSigned-off-by: G.Balaji \u003cbalajig81@gmail.com\u003e\nAcked-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4b2a58abd1e17c0ee53c8dded879e015917cca67",
      "tree": "585a02b8e3e36f7e6069d43000355e75aba097d3",
      "parents": [
        "e2c3d29b4295c3eec18294bc34f0c99a7b9ae413"
      ],
      "author": {
        "name": "Tommi Virtanen",
        "email": "tommi.virtanen@dreamhost.com",
        "time": "Mon Mar 28 14:59:38 2011 -0700"
      },
      "committer": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Tue Mar 29 12:11:24 2011 -0700"
      },
      "message": "libceph: Create a new key type \"ceph\".\n\nThis allows us to use existence of the key type as a feature test,\nfrom userspace.\n\nSigned-off-by: Tommi Virtanen \u003ctommi.virtanen@dreamhost.com\u003e\nSigned-off-by: Sage Weil \u003csage@newdream.net\u003e\n"
    },
    {
      "commit": "e2c3d29b4295c3eec18294bc34f0c99a7b9ae413",
      "tree": "29fbffeeed7e2774a4f87883ae01798079d85ed2",
      "parents": [
        "8323c3aa74cd92465350294567142d12ffdcc963"
      ],
      "author": {
        "name": "Tommi Virtanen",
        "email": "tommi.virtanen@dreamhost.com",
        "time": "Fri Mar 25 16:40:48 2011 -0700"
      },
      "committer": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Tue Mar 29 12:11:19 2011 -0700"
      },
      "message": "libceph: Get secret from the kernel keys api when mounting with key\u003dNAME.\n\nSigned-off-by: Tommi Virtanen \u003ctommi.virtanen@dreamhost.com\u003e\nSigned-off-by: Sage Weil \u003csage@newdream.net\u003e\n"
    },
    {
      "commit": "8323c3aa74cd92465350294567142d12ffdcc963",
      "tree": "052e7374393994eea8d534f98ee1bc7acea4c2d9",
      "parents": [
        "fbdb9190482fd83a3eb20cdeb0da454759f479d7"
      ],
      "author": {
        "name": "Tommi Virtanen",
        "email": "tommi.virtanen@dreamhost.com",
        "time": "Fri Mar 25 16:32:57 2011 -0700"
      },
      "committer": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Tue Mar 29 12:11:16 2011 -0700"
      },
      "message": "ceph: Move secret key parsing earlier.\n\nThis makes the base64 logic be contained in mount option parsing,\nand prepares us for replacing the homebew key management with the\nkernel key retention service.\n\nSigned-off-by: Tommi Virtanen \u003ctommi.virtanen@dreamhost.com\u003e\nSigned-off-by: Sage Weil \u003csage@newdream.net\u003e\n"
    },
    {
      "commit": "fbdb9190482fd83a3eb20cdeb0da454759f479d7",
      "tree": "bf83dcd6ea13c9a1feedb2a8f79744de93f9fecd",
      "parents": [
        "234af26ff123dfb2aa48772124721b1354c8e0a5"
      ],
      "author": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Tue Mar 29 12:11:06 2011 -0700"
      },
      "committer": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Tue Mar 29 12:11:06 2011 -0700"
      },
      "message": "libceph: fix null dereference when unregistering linger requests\n\nWe should only clear r_osd if we are neither registered as a linger or a\nregular request.  We may unregister as a linger while still registered as\na regular request (e.g., in reset_osd).  Incorrectly clearing r_osd there\nleads to a null pointer dereference in __send_request.\n\nAlso simplify the parallel check in __unregister_request() where we just\nremoved r_osd_item and know it\u0027s empty.\n\nSigned-off-by: Sage Weil \u003csage@newdream.net\u003e\n"
    },
    {
      "commit": "234af26ff123dfb2aa48772124721b1354c8e0a5",
      "tree": "9dfaaeb25a5b1265269796ebc48cab93d64fc1f2",
      "parents": [
        "6b0ae4097c1ebad98c7b33f83b4ca7e93890ed12"
      ],
      "author": {
        "name": "Dan Carpenter",
        "email": "error27@gmail.com",
        "time": "Tue Mar 29 06:25:59 2011 +0300"
      },
      "committer": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Tue Mar 29 08:59:54 2011 -0700"
      },
      "message": "ceph: unlock on error in ceph_osdc_start_request()\n\nThere was a missing unlock on the error path if __map_request() failed.\n\nSigned-off-by: Dan Carpenter \u003cerror27@gmail.com\u003e\nSigned-off-by: Sage Weil \u003csage@newdream.net\u003e\n"
    },
    {
      "commit": "cb1817b37313b4b6c7f8f93c730553dd3cb6ac57",
      "tree": "30c9b246c77ad338f177a5a32a45eb92e5994652",
      "parents": [
        "89078d572eb9ce8d4c04264b8b0ba86de0d74c8f",
        "02aadf72fe2c83f145e3437734e66be53abae481"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Mar 29 07:41:33 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Mar 29 07:41:33 2011 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (30 commits)\n  xfrm: Restrict extended sequence numbers to esp\n  xfrm: Check for esn buffer len in xfrm_new_ae\n  xfrm: Assign esn pointers when cloning a state\n  xfrm: Move the test on replay window size into the replay check functions\n  netdev: bfin_mac: document TE setting in RMII modes\n  drivers net: Fix declaration ordering in inline functions.\n  cxgb3: Apply interrupt coalescing settings to all queues\n  net: Always allocate at least 16 skb frags regardless of page size\n  ipv4: Don\u0027t ip_rt_put() an error pointer in RAW sockets.\n  net: fix ethtool-\u003eset_flags not intended -EINVAL return value\n  mlx4_en: Fix loss of promiscuity\n  tg3: Fix inline keyword usage\n  tg3: use \u003clinux/io.h\u003e and \u003clinux/uaccess.h\u003e instead \u003casm/io.h\u003e and \u003casm/uaccess.h\u003e\n  net: use CHECKSUM_NONE instead of magic number\n  Net / jme: Do not use legacy PCI power management\n  myri10ge: small rx_done refactoring\n  bridge: notify applications if address of bridge device changes\n  ipv4: Fix IP timestamp option (IPOPT_TS_PRESPEC) handling in ip_options_echo()\n  can: c_can: Fix tx_bytes accounting\n  can: c_can_platform: fix irq check in probe\n  ...\n"
    },
    {
      "commit": "02aadf72fe2c83f145e3437734e66be53abae481",
      "tree": "889b435105ed020eb4b821b2ffcd2fa878dfd84f",
      "parents": [
        "e2b19125e94124daaeda1ddcf9b85b04575ad86f"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon Mar 28 19:48:09 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 28 23:34:53 2011 -0700"
      },
      "message": "xfrm: Restrict extended sequence numbers to esp\n\nThe IPsec extended sequence numbers are fully implemented just for\nesp. So restrict the usage to esp until other protocols have\nsupport too.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e2b19125e94124daaeda1ddcf9b85b04575ad86f",
      "tree": "ee670f037ea5b3826731ea5169f1afe94b925f16",
      "parents": [
        "af2f464e326ebad57284cfdecb03f1606e89bbc7"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon Mar 28 19:47:30 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 28 23:34:52 2011 -0700"
      },
      "message": "xfrm: Check for esn buffer len in xfrm_new_ae\n\nIn xfrm_new_ae() we may overwrite the allocated esn replay state\nbuffer with a wrong size. So check that the new size matches the\noriginal allocated size and return an error if this is not the case.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "af2f464e326ebad57284cfdecb03f1606e89bbc7",
      "tree": "0b9f1e9918a47f49e1454a0df5e045a0d627050d",
      "parents": [
        "36ae0148dbb6b9e15d8f067bb7523fd2b765a6af"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon Mar 28 19:46:39 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 28 23:34:52 2011 -0700"
      },
      "message": "xfrm: Assign esn pointers when cloning a state\n\nWhen we clone a xfrm state we have to assign the replay_esn\nand the preplay_esn pointers to the state if we use the\nnew replay detection method. To this end, we add a\nxfrm_replay_clone() function that allocates memory for\nthe replay detection and takes over the necessary values\nfrom the original state.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "36ae0148dbb6b9e15d8f067bb7523fd2b765a6af",
      "tree": "3ce6c552fc83d83beb5a0a35fb85e4f38f3dd251",
      "parents": [
        "72f49050ba18959472aac723cd9d094bc3547e89"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon Mar 28 19:45:52 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 28 23:34:51 2011 -0700"
      },
      "message": "xfrm: Move the test on replay window size into the replay check functions\n\nAs it is, the replay check is just performed if the replay window of the\nlegacy implementation is nonzero. So we move the test on a nonzero replay\nwindow inside the replay check functions to be sure we are testing for the\nright implementation.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4910ac6c526d2868adcb5893e0c428473de862b5",
      "tree": "f5fcd4425ee8ae7bd88f3a1fc4e9bb58592aff1b",
      "parents": [
        "673e63c688f43104c73aad8ea4237f7ad41fa14d"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 28 16:51:15 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 28 16:51:15 2011 -0700"
      },
      "message": "ipv4: Don\u0027t ip_rt_put() an error pointer in RAW sockets.\n\nReported-by: Marc Kleine-Budde \u003cmkl@pengutronix.de\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "499fe9a419d43410be576bcc825658997b6ce822",
      "tree": "6a47ff6d40fd98f1cb373565a620beec921451e0",
      "parents": [
        "2b78ac9bfc7483ba4bda9ad3d10dd4afcf88337c"
      ],
      "author": {
        "name": "Daniel Halperin",
        "email": "dhalperi@cs.washington.edu",
        "time": "Thu Mar 24 16:01:48 2011 -0700"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Mar 28 15:42:02 2011 -0400"
      },
      "message": "mac80211: fix aggregation frame release during timeout\n\nSuppose the aggregation reorder buffer looks like this:\n\nx-T-R1-y-R2,\n\nwhere x and y are frames that have not been received, T is a received\nframe that has timed out, and R1,R2 are received frames that have not\nyet timed out. The proper behavior in this scenario is to move the\nwindow past x (skipping it), release T and R1, and leave the window at y\nuntil y is received or R2 times out.\n\nAs written, this code will instead leave the window at R1, because it\nhas not yet timed out. Fix this by exiting the reorder loop only when\nthe frame that has not timed out AND there are skipped frames earlier in\nthe current valid window.\n\nSigned-off-by: Daniel Halperin \u003cdhalperi@cs.washington.edu\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "2b78ac9bfc7483ba4bda9ad3d10dd4afcf88337c",
      "tree": "da48e2e10050b2e535b908119bf60fe86b17b1e4",
      "parents": [
        "bef9bacc4ec7ea6a02876164cd6ccaa4759edce4"
      ],
      "author": {
        "name": "Juuso Oikarinen",
        "email": "juuso.oikarinen@nokia.com",
        "time": "Mon Mar 28 14:32:32 2011 +0300"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Mar 28 15:42:02 2011 -0400"
      },
      "message": "cfg80211: fix BSS double-unlinking (continued)\n\nThis patch adds to the fix \"fix BSS double-unlinking\"\n(commit 3207390a8b58bfc1335750f91cf6783c48ca19ca) by Johannes Berg.\n\nIt turns out, that the double-unlinking scenario can also occur if expired\nBSS elements are removed whilst an interface is performing association.\n\nTo work around that, replace list_del with list_del_init also in the\n\"cfg80211_bss_expire\" function, so that the check for whether the BSS still is\nin the list works correctly in cfg80211_unlink_bss.\n\nSigned-off-by: Juuso Oikarinen \u003cjuuso.oikarinen@nokia.com\u003e\nReviewed-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "bef9bacc4ec7ea6a02876164cd6ccaa4759edce4",
      "tree": "e68100ba3efa0ce2a13636027565f422e55bbd95",
      "parents": [
        "67aa030c0dff6095128bcb4e8043b48360f32331"
      ],
      "author": {
        "name": "Mariusz Kozlowski",
        "email": "mk@lab.zgora.pl",
        "time": "Sat Mar 26 19:26:55 2011 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Mar 28 15:42:02 2011 -0400"
      },
      "message": "cfg80211:: fix possible NULL pointer dereference\n\nIn cfg80211_inform_bss_frame() wiphy is first dereferenced on privsz\ninitialisation and then it is checked for NULL. This patch fixes that.\n\nSigned-off-by: Mariusz Kozlowski \u003cmk@lab.zgora.pl\u003e\nAcked-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "67aa030c0dff6095128bcb4e8043b48360f32331",
      "tree": "91f839fbe604cf1f96a12b2ca09bb65a317fe284",
      "parents": [
        "1f951a7f8ba05192291f781ef99a892697e47d62"
      ],
      "author": {
        "name": "Mariusz Kozlowski",
        "email": "mk@lab.zgora.pl",
        "time": "Sat Mar 26 18:58:51 2011 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Mar 28 15:42:02 2011 -0400"
      },
      "message": "mac80211: fix possible NULL pointer dereference\n\nThis patch moves \u0027key\u0027 dereference after BUG_ON(!key) so that when key is NULL\nwe will see proper trace instead of oops.\n\nSigned-off-by: Mariusz Kozlowski \u003cmk@lab.zgora.pl\u003e\nAcked-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "1f951a7f8ba05192291f781ef99a892697e47d62",
      "tree": "88ff9259029103301e54de42be6deef69bd59ec2",
      "parents": [
        "f62d816fc4324afbb7cf90110c70b6a14139b225"
      ],
      "author": {
        "name": "Petr Štetiar",
        "email": "ynezz@true.cz",
        "time": "Sun Mar 27 13:31:26 2011 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Mar 28 15:42:02 2011 -0400"
      },
      "message": "mac80211: fix NULL pointer dereference in ieee80211_key_alloc()\n\nThe ieee80211_key struct can be kfree()d several times in the function, for\nexample if some of the key setup functions fails beforehand, but there\u0027s no\ncheck if the struct is still valid before we call memcpy() and INIT_LIST_HEAD()\non it.  In some cases (like it was in my case), if there\u0027s missing aes-generic\nmodule it could lead to the following kernel OOPS:\n\n\tUnable to handle kernel NULL pointer dereference at virtual address 0000018c\n\t....\n\tPC is at memcpy+0x80/0x29c\n\t...\n\tBacktrace:\n\t[\u003cbf11c5e4\u003e] (ieee80211_key_alloc+0x0/0x234 [mac80211]) from [\u003cbf1148b4\u003e] (ieee80211_add_key+0x70/0x12c [mac80211])\n\t[\u003cbf114844\u003e] (ieee80211_add_key+0x0/0x12c [mac80211]) from [\u003cbf070cc0\u003e] (__cfg80211_set_encryption+0x2a8/0x464 [cfg80211])\n\nSigned-off-by: Petr Štetiar \u003cynezz@true.cz\u003e\nReviewed-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "4dc217df68a17a57f8464c74c1b4785e40bddf77",
      "tree": "12a239bc636c6499f929ed352e496559bbc241f1",
      "parents": [
        "b77dcf8460ae57d4eb9fd3633eb4f97b8fb20716"
      ],
      "author": {
        "name": "Felix Fietkau",
        "email": "nbd@openwrt.org",
        "time": "Fri Mar 25 15:30:38 2011 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Mar 28 15:42:01 2011 -0400"
      },
      "message": "mac80211: fix a crash in minstrel_ht in HT mode with no supported MCS rates\n\nWhen a client connects in HT mode but does not provide any valid MCS\nrates, the function that finds the next sample rate gets stuck in an\ninfinite loop.\nFix this by falling back to legacy rates if no usable MCS rates are found.\n\nSigned-off-by: Felix Fietkau \u003cnbd@openwrt.org\u003e\nCc: stable@kernel.org\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "673e63c688f43104c73aad8ea4237f7ad41fa14d",
      "tree": "3d11c6f74a5d0823020db8642c3f2cf062347afb",
      "parents": [
        "b5845f9834d8f4c79d324bc59b99dbcf0a40f428"
      ],
      "author": {
        "name": "Stanislaw Gruszka",
        "email": "sgruszka@redhat.com",
        "time": "Tue Mar 22 23:54:49 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 27 23:35:24 2011 -0700"
      },
      "message": "net: fix ethtool-\u003eset_flags not intended -EINVAL return value\n\nAfter commit d5dbda23804156ae6f35025ade5307a49d1db6d7 \"ethtool: Add\nsupport for vlan accleration.\", drivers that have NETIF_F_HW_VLAN_TX,\nand/or NETIF_F_HW_VLAN_RX feature, but do not allow enable/disable vlan\nacceleration via ethtool set_flags, always return -EINVAL from that\nfunction. Fix by returning -EINVAL only if requested features do not\nmatch current settings and can not be changed by driver.\n\nChange any driver that define ethtool-\u003eset_flags to use\nethtool_invalid_flags() to avoid similar problems in the future\n(also on drivers that do not have the problem).\n\nTested with modified (to reproduce this bug) myri10ge driver.\n\nCc: stable@kernel.org # 2.6.37+\nSigned-off-by: Stanislaw Gruszka \u003csgruszka@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3e49e6d520401e1d25ec8d366520aad2c01adc1c",
      "tree": "60dac2bdbce6b61524ac1f12468841470607c5ad",
      "parents": [
        "f4e5bd4f5784c0608078805f29d4a4897ee482f7"
      ],
      "author": {
        "name": "Cesar Eduardo Barros",
        "email": "cesarb@cesarb.net",
        "time": "Sat Mar 26 05:10:30 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 27 23:35:05 2011 -0700"
      },
      "message": "net: use CHECKSUM_NONE instead of magic number\n\nTwo places in the kernel were doing skb-\u003eip_summed \u003d 0.\n\nChange both to skb-\u003eip_summed \u003d CHECKSUM_NONE, which is more readable.\n\nSigned-off-by: Cesar Eduardo Barros \u003ccesarb@cesarb.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "edf947f10074fea27fdb1730524dca59355a1c40",
      "tree": "4141cd2fa39ae589055057e912d3235150d670c5",
      "parents": [
        "8628bd8af7c4c14f40f5183f80f5744c4e682439"
      ],
      "author": {
        "name": "stephen hemminger",
        "email": "shemminger@vyatta.com",
        "time": "Thu Mar 24 13:24:01 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 27 23:35:02 2011 -0700"
      },
      "message": "bridge: notify applications if address of bridge device changes\n\nThe mac address of the bridge device may be changed when a new interface\nis added to the bridge. If this happens, then the bridge needs to call\nthe network notifiers to tickle any other systems that care. Since bridge\ncan be a module, this also means exporting the notifier function.\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8628bd8af7c4c14f40f5183f80f5744c4e682439",
      "tree": "d931f03c6ef14ad8df7c6c697e56081f816c2af7",
      "parents": [
        "dc760b375e50a47847d4942811bd9679beeb5535"
      ],
      "author": {
        "name": "Jan Luebbe",
        "email": "jluebbe@debian.org",
        "time": "Thu Mar 24 07:44:22 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 27 23:35:02 2011 -0700"
      },
      "message": "ipv4: Fix IP timestamp option (IPOPT_TS_PRESPEC) handling in ip_options_echo()\n\nThe current handling of echoed IP timestamp options with prespecified\naddresses is rather broken since the 2.2.x kernels. As far as i understand\nit, it should behave like when originating packets.\n\nCurrently it will only timestamp the next free slot if:\n - there is space for *two* timestamps\n - some random data from the echoed packet taken as an IP is *not* a local IP\n\nThis first is caused by an off-by-one error. \u0027soffset\u0027 points to the next\nfree slot and so we only need to have \u0027soffset + 7 \u003c\u003d optlen\u0027.\n\nThe second bug is using sptr as the start of the option, when it really is\nset to \u0027skb_network_header(skb)\u0027. I just use dptr instead which points to\nthe timestamp option.\n\nFinally it would only timestamp for non-local IPs, which we shouldn\u0027t do.\nSo instead we exclude all unicast destinations, similar to what we do in\nip_options_compile().\n\nSigned-off-by: Jan Luebbe \u003cjluebbe@debian.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "53914b67993c724cec585863755c9ebc8446e83b",
      "tree": "851d031dd41a74c7e03436ca7c98455fee1c598e",
      "parents": [
        "3b261ade4224852ed841ecfd13876db812846e96"
      ],
      "author": {
        "name": "Oliver Hartkopp",
        "email": "socketcan@hartkopp.net",
        "time": "Tue Mar 22 08:27:25 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 27 23:34:59 2011 -0700"
      },
      "message": "can: make struct proto const\n\ncan_ioctl is the only reason for struct proto to be non-const.\nscript/check-patch.pl suggests struct proto be const.\n\nSetting the reference to the common can_ioctl() in all CAN protocols directly\nremoves the need to make the struct proto writable in af_can.c\n\nSigned-off-by: Kurt Van Dijck \u003ckurt.van.dijck@eia.be\u003e\nSigned-off-by: Oliver Hartkopp \u003csocketcan@hartkopp.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3b261ade4224852ed841ecfd13876db812846e96",
      "tree": "974b0942fc29b3ec413d8ade586b971cb25be4c3",
      "parents": [
        "e0bccd315db0c2f919e7fcf9cb60db21d9986f52"
      ],
      "author": {
        "name": "Amerigo Wang",
        "email": "amwang@redhat.com",
        "time": "Tue Mar 22 01:59:47 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 27 23:34:59 2011 -0700"
      },
      "message": "net: remove useless comments in net/core/dev.c\n\nThe code itself can explain what it is doing, no need these comments.\n\nSigned-off-by: WANG Cong \u003camwang@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e0bccd315db0c2f919e7fcf9cb60db21d9986f52",
      "tree": "8cf512f43221087f964c0f55c7665e293e96921b",
      "parents": [
        "be20250c13f88375345ad99950190685eda51eb8"
      ],
      "author": {
        "name": "Ben Hutchings",
        "email": "ben@decadent.org.uk",
        "time": "Sun Mar 20 06:48:05 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 27 17:59:04 2011 -0700"
      },
      "message": "rose: Add length checks to CALL_REQUEST parsing\n\nDefine some constant offsets for CALL_REQUEST based on the description\nat \u003chttp://www.techfest.com/networking/wan/x25plp.htm\u003e and the\ndefinition of ROSE as using 10-digit (5-byte) addresses.  Use them\nconsistently.  Validate all implicit and explicit facilities lengths.\nValidate the address length byte rather than either trusting or\nassuming its value.\n\nSigned-off-by: Ben Hutchings \u003cben@decadent.org.uk\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "be20250c13f88375345ad99950190685eda51eb8",
      "tree": "71135bced4717604dff6e37d00f06f20870bbe1c",
      "parents": [
        "d370af0ef7951188daeb15bae75db7ba57c67846"
      ],
      "author": {
        "name": "Dan Rosenberg",
        "email": "drosenberg@vsecurity.com",
        "time": "Sat Mar 19 20:43:43 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 27 17:59:03 2011 -0700"
      },
      "message": "ROSE: prevent heap corruption with bad facilities\n\nWhen parsing the FAC_NATIONAL_DIGIS facilities field, it\u0027s possible for\na remote host to provide more digipeaters than expected, resulting in\nheap corruption.  Check against ROSE_MAX_DIGIS to prevent overflows, and\nabort facilities parsing on failure.\n\nAdditionally, when parsing the FAC_CCITT_DEST_NSAP and\nFAC_CCITT_SRC_NSAP facilities fields, a remote host can provide a length\nof less than 10, resulting in an underflow in a memcpy size, causing a\nkernel panic due to massive heap corruption.  A length of greater than\n20 results in a stack overflow of the callsign array.  Abort facilities\nparsing on these invalid length values.\n\nSigned-off-by: Dan Rosenberg \u003cdrosenberg@vsecurity.com\u003e\nCc: stable@kernel.org\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d370af0ef7951188daeb15bae75db7ba57c67846",
      "tree": "f884335124cf68d375afef3226a7378e6f5f3d33",
      "parents": [
        "d50e7e3604778bfc2dc40f440e0742dbae399d54"
      ],
      "author": {
        "name": "Dan Rosenberg",
        "email": "drosenberg@vsecurity.com",
        "time": "Sun Mar 20 15:32:06 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 27 17:59:02 2011 -0700"
      },
      "message": "irda: validate peer name and attribute lengths\n\nLength fields provided by a peer for names and attributes may be longer\nthan the destination array sizes.  Validate lengths to prevent stack\nbuffer overflows.\n\nSigned-off-by: Dan Rosenberg \u003cdrosenberg@vsecurity.com\u003e\nCc: stable@kernel.org\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d50e7e3604778bfc2dc40f440e0742dbae399d54",
      "tree": "6ff38b491047533a9cbe74f04e231c14c2a6d0f3",
      "parents": [
        "e433430a0ca9cc1b851a83ac3b305e955b64880a"
      ],
      "author": {
        "name": "Dan Rosenberg",
        "email": "drosenberg@vsecurity.com",
        "time": "Sat Mar 19 20:14:30 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 27 17:59:02 2011 -0700"
      },
      "message": "irda: prevent heap corruption on invalid nickname\n\nInvalid nicknames containing only spaces will result in an underflow in\na memcpy size calculation, subsequently destroying the heap and\npanicking.\n\nv2 also catches the case where the provided nickname is longer than the\nbuffer size, which can result in controllable heap corruption.\n\nSigned-off-by: Dan Rosenberg \u003cdrosenberg@vsecurity.com\u003e\nCc: stable@kernel.org\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e433430a0ca9cc1b851a83ac3b305e955b64880a",
      "tree": "129e0c5db7e5643352ac55a920b5d6c5ef65fb66",
      "parents": [
        "3bc07321ccc236f693ce1b6a8786f0a2e38bb87e"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Mar 15 21:09:32 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 27 17:55:01 2011 -0700"
      },
      "message": "dst: Clone child entry in skb_dst_pop\n\nWe clone the child entry in skb_dst_pop before we call\nskb_dst_drop(). Otherwise we might kill the child right\nbefore we return it to the caller.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3bc07321ccc236f693ce1b6a8786f0a2e38bb87e",
      "tree": "b20b9171ccfb5eb869d3f4c5f005eb7c221b9f70",
      "parents": [
        "1fbc78439291627642517f15b9b91f3125588143"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Mar 15 21:08:28 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 27 17:55:01 2011 -0700"
      },
      "message": "xfrm: Force a dst refcount before entering the xfrm type handlers\n\nCrypto requests might return asynchronous. In this case we leave\nthe rcu protected region, so force a refcount on the skb\u0027s\ndestination entry before we enter the xfrm type input/output\nhandlers.\n\nThis fixes a crash when a route is deleted whilst sending IPsec\ndata that is transformed by an asynchronous algorithm.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a271c5a0dea418931b6a903ef85adc30ad4c54be",
      "tree": "1f2e926c8d7c4f635d703bc2c2470120408a0738",
      "parents": [
        "a0e7e3cf7932d6c77de0dc79a40dbaeb8060b544"
      ],
      "author": {
        "name": "OGAWA Hirofumi",
        "email": "hirofumi@mail.parknet.co.jp",
        "time": "Sun Mar 27 17:48:57 2011 +0200"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Sun Mar 27 17:55:36 2011 +0200"
      },
      "message": "NFS: Ensure that rpc_release_resources_task() can be called twice.\n\nBUG: atomic_dec_and_test(): -1: atomic counter underflow at:\nPid: 2827, comm: mount.nfs Not tainted 2.6.38 #1\nCall Trace:\n [\u003cffffffffa02223a0\u003e] ? put_rpccred+0x44/0x14e [sunrpc]\n [\u003cffffffffa021bbe9\u003e] ? rpc_ping+0x4e/0x58 [sunrpc]\n [\u003cffffffffa021c4a5\u003e] ? rpc_create+0x481/0x4fc [sunrpc]\n [\u003cffffffffa022298a\u003e] ? rpcauth_lookup_credcache+0xab/0x22d [sunrpc]\n [\u003cffffffffa028be8c\u003e] ? nfs_create_rpc_client+0xa6/0xeb [nfs]\n [\u003cffffffffa028c660\u003e] ? nfs4_set_client+0xc2/0x1f9 [nfs]\n [\u003cffffffffa028cd3c\u003e] ? nfs4_create_server+0xf2/0x2a6 [nfs]\n [\u003cffffffffa0295d07\u003e] ? nfs4_remote_mount+0x4e/0x14a [nfs]\n [\u003cffffffff810dd570\u003e] ? vfs_kern_mount+0x6e/0x133\n [\u003cffffffffa029605a\u003e] ? nfs_do_root_mount+0x76/0x95 [nfs]\n [\u003cffffffffa029643d\u003e] ? nfs4_try_mount+0x56/0xaf [nfs]\n [\u003cffffffffa0297434\u003e] ? nfs_get_sb+0x435/0x73c [nfs]\n [\u003cffffffff810dd59b\u003e] ? vfs_kern_mount+0x99/0x133\n [\u003cffffffff810dd693\u003e] ? do_kern_mount+0x48/0xd8\n [\u003cffffffff810f5b75\u003e] ? do_mount+0x6da/0x741\n [\u003cffffffff810f5c5f\u003e] ? sys_mount+0x83/0xc0\n [\u003cffffffff8100293b\u003e] ? system_call_fastpath+0x16/0x1b\n\nWell, so, I think this is real bug of nfs codes somewhere. With some\nreview, the code\n\nrpc_call_sync()\n    rpc_run_task\n        rpc_execute()\n            __rpc_execute()\n                rpc_release_task()\n                    rpc_release_resources_task()\n                        put_rpccred()                \u003c\u003d release cred\n    rpc_put_task\n        rpc_do_put_task()\n            rpc_release_resources_task()\n                put_rpccred()                        \u003c\u003d release cred again\n\nseems to be release cred unintendedly.\n\nSigned-off-by: OGAWA Hirofumi \u003chirofumi@mail.parknet.co.jp\u003e\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\n"
    },
    {
      "commit": "6b0ae4097c1ebad98c7b33f83b4ca7e93890ed12",
      "tree": "27db559925e8e3f08522d83f4a6f3b7d32a9f2fa",
      "parents": [
        "ef550f6f4f6c9345a27ec85d98f4f7de1adce79c"
      ],
      "author": {
        "name": "Mariusz Kozlowski",
        "email": "mk@lab.zgora.pl",
        "time": "Sat Mar 26 19:29:34 2011 +0100"
      },
      "committer": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Sat Mar 26 13:41:20 2011 -0700"
      },
      "message": "ceph: fix possible NULL pointer dereference\n\nThis patch fixes \u0027event_work\u0027 dereference before it is checked for NULL.\n\nSigned-off-by: Mariusz Kozlowski \u003cmk@lab.zgora.pl\u003e\nSigned-off-by: Sage Weil \u003csage@newdream.net\u003e\n"
    },
    {
      "commit": "00a2470546dd8427325636a711a42c934135dbf5",
      "tree": "9567002c1ae07a918ccf11ec2a72c6e4831cb535",
      "parents": [
        "5aafdea448fb86412a6f8e46df518c1545d32436",
        "6df59a84eccd4cad7fcefda3e0c5e55239a3b2dd"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Mar 25 21:02:22 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Mar 25 21:02:22 2011 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (56 commits)\n  route: Take the right src and dst addresses in ip_route_newports\n  ipv4: Fix nexthop caching wrt. scoping.\n  ipv4: Invalidate nexthop cache nh_saddr more correctly.\n  net: fix pch_gbe section mismatch warning\n  ipv4: fix fib metrics\n  mlx4_en: Removing HW info from ethtool -i report.\n  net_sched: fix THROTTLED/RUNNING race\n  drivers/net/a2065.c: Convert release_resource to release_region/release_mem_region\n  drivers/net/ariadne.c: Convert release_resource to release_region/release_mem_region\n  bonding: fix rx_handler locking\n  myri10ge: fix rmmod crash\n  mlx4_en: updated driver version to 1.5.4.1\n  mlx4_en: Using blue flame support\n  mlx4_core: reserve UARs for userspace consumers\n  mlx4_core: maintain available field in bitmap allocator\n  mlx4: Add blue flame support for kernel consumers\n  mlx4_en: Enabling new steering\n  mlx4: Add support for promiscuous mode in the new steering model.\n  mlx4: generalization of multicast steering.\n  mlx4_en: Reporting HW revision in ethtool -i\n  ...\n"
    },
    {
      "commit": "1fbc78439291627642517f15b9b91f3125588143",
      "tree": "bde47a81d7d45f9b7027b51b339c966ba87136a5",
      "parents": [
        "6df59a84eccd4cad7fcefda3e0c5e55239a3b2dd"
      ],
      "author": {
        "name": "Julian Anastasov",
        "email": "ja@ssi.bg",
        "time": "Fri Mar 25 20:33:23 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Mar 25 20:33:23 2011 -0700"
      },
      "message": "ipv4: do not ignore route errors\n\n\tThe \"ipv4: Inline fib_semantic_match into check_leaf\"\nchange forgets to return the route errors. check_leaf should\nreturn the same results as fib_table_lookup.\n\nSigned-off-by: Julian Anastasov \u003cja@ssi.bg\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ef550f6f4f6c9345a27ec85d98f4f7de1adce79c",
      "tree": "dafd71f3e7fe46ed685b5ab3fd62c2bb7d3cb679",
      "parents": [
        "59c2be1e4d42c0d4949cecdeef3f37070a1fbc13"
      ],
      "author": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Fri Mar 25 13:27:48 2011 -0700"
      },
      "committer": {
        "name": "Sage Weil",
        "email": "sage@newdream.net",
        "time": "Fri Mar 25 13:27:48 2011 -0700"
      },
      "message": "ceph: flush msgr_wq during mds_client shutdown\n\nThe release method for mds connections uses a backpointer to the\nmds_client, so we need to flush the workqueue of any pending work (and\nceph_connection references) prior to freeing the mds_client.  This fixes\nan oops easily triggered under UML by\n\n while true ; do mount ... ; umount ... ; done\n\nAlso fix an outdated comment: the flush in ceph_destroy_client only flushes\nOSD connections out.  This bug is basically an artifact of the ceph -\u003e\nceph+libceph conversion.\n\nSigned-off-by: Sage Weil \u003csage@newdream.net\u003e\n"
    },
    {
      "commit": "40471856f2e38e9bfa8d605295e8234421110dd6",
      "tree": "9757e42e40bdbfcff7c52ab133e32b5c2203153b",
      "parents": [
        "ae005cbed12d0b340b04b59d6f5c56e710b3895d",
        "0acd2201920d0968919f4f5797d63f7b6f2b19d4"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Mar 25 10:03:28 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Mar 25 10:03:28 2011 -0700"
      },
      "message": "Merge branch \u0027nfs-for-2.6.39\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6\n\n* \u0027nfs-for-2.6.39\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6: (28 commits)\n  Cleanup XDR parsing for LAYOUTGET, GETDEVICEINFO\n  NFSv4.1 convert layoutcommit sync to boolean\n  NFSv4.1 pnfs_layoutcommit_inode fixes\n  NFS: Determine initial mount security\n  NFS: use secinfo when crossing mountpoints\n  NFS: Add secinfo procedure\n  NFS: lookup supports alternate client\n  NFS: convert call_sync() to a function\n  NFSv4.1 remove temp code that prevented ds commits\n  NFSv4.1: layoutcommit\n  NFSv4.1: filelayout driver specific code for COMMIT\n  NFSv4.1: remove GETATTR from ds commits\n  NFSv4.1: add generic layer hooks for pnfs COMMIT\n  NFSv4.1: alloc and free commit_buckets\n  NFSv4.1: shift filelayout_free_lseg\n  NFSv4.1: pull out code from nfs_commit_release\n  NFSv4.1: pull error handling out of nfs_commit_list\n  NFSv4.1: add callback to nfs4_commit_done\n  NFSv4.1: rearrange nfs_commit_rpcsetup\n  NFSv4.1: don\u0027t send COMMIT to ds for data sync writes\n  ...\n"
    },
    {
      "commit": "37e826c513883099c298317bad1b3b677b2905fb",
      "tree": "a032cfe69e0cde179d86eba157cf9dc85d67df86",
      "parents": [
        "436c3b66ec9824a633724ae42de1c416af4f2063"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 24 18:06:47 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 24 18:06:47 2011 -0700"
      },
      "message": "ipv4: Fix nexthop caching wrt. scoping.\n\nMove the scope value out of the fib alias entries and into fib_info,\nso that we always use the correct scope when recomputing the nexthop\ncached source address.\n\nReported-by: Julian Anastasov \u003cja@ssi.bg\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "436c3b66ec9824a633724ae42de1c416af4f2063",
      "tree": "8da6452386b6e900c4226c9b67694d1ea21e847e",
      "parents": [
        "f7594d42944c0dfca90318f50978a4bdf8504086"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 24 17:42:21 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 24 17:42:21 2011 -0700"
      },
      "message": "ipv4: Invalidate nexthop cache nh_saddr more correctly.\n\nAny operation that:\n\n1) Brings up an interface\n2) Adds an IP address to an interface\n3) Deletes an IP address from an interface\n\ncan potentially invalidate the nh_saddr value, requiring\nit to be recomputed.\n\nPerform the recomputation lazily using a generation ID.\n\nReported-by: Julian Anastasov \u003cja@ssi.bg\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0acd2201920d0968919f4f5797d63f7b6f2b19d4",
      "tree": "9b241d264f42eff3ff4eeffb67616fca0490e460",
      "parents": [
        "8f70e95f9f4159184f557a1db60c909d7c1bd2e3",
        "35124a0994fc02545b14b9fa3aad000b3331f1c0"
      ],
      "author": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Thu Mar 24 17:03:14 2011 -0400"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Thu Mar 24 17:03:14 2011 -0400"
      },
      "message": "Merge branch \u0027nfs-for-2.6.39\u0027 into nfs-for-next\n"
    },
    {
      "commit": "b77dcf8460ae57d4eb9fd3633eb4f97b8fb20716",
      "tree": "74bd5ef5e87325579994ec8f75500672eff718ef",
      "parents": [
        "a0cc9a1b5712ea52aaa4e7abfa0ec2dbe0d820ff"
      ],
      "author": {
        "name": "Thomas Gleixner",
        "email": "tglx@linutronix.de",
        "time": "Thu Mar 24 20:16:42 2011 +0100"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Mar 24 17:04:44 2011 -0300"
      },
      "message": "Bluetooth: Fix warning with hci_cmd_timer\n\nAfter we made debugobjects working again, we got the following:\n\nWARNING: at lib/debugobjects.c:262 debug_print_object+0x8e/0xb0()\nHardware name: System Product Name\nODEBUG: free active (active state 0) object type: timer_list hint: hci_cmd_timer+0x0/0x60\nPid: 2125, comm: dmsetup Tainted: G        W   2.6.38-06707-gc62b389 #110375\nCall Trace:\n [\u003cffffffff8104700a\u003e] warn_slowpath_common+0x7a/0xb0\n [\u003cffffffff810470b6\u003e] warn_slowpath_fmt+0x46/0x50\n [\u003cffffffff812d3a5e\u003e] debug_print_object+0x8e/0xb0\n [\u003cffffffff81bd8810\u003e] ? hci_cmd_timer+0x0/0x60\n [\u003cffffffff812d4685\u003e] debug_check_no_obj_freed+0x125/0x230\n [\u003cffffffff810f1063\u003e] ? check_object+0xb3/0x2b0\n [\u003cffffffff810f3630\u003e] kfree+0x150/0x190\n [\u003cffffffff81be4d06\u003e] ? bt_host_release+0x16/0x20\n [\u003cffffffff81be4d06\u003e] bt_host_release+0x16/0x20\n [\u003cffffffff813a1907\u003e] device_release+0x27/0xa0\n [\u003cffffffff812c519c\u003e] kobject_release+0x4c/0xa0\n [\u003cffffffff812c5150\u003e] ? kobject_release+0x0/0xa0\n [\u003cffffffff812c61f6\u003e] kref_put+0x36/0x70\n [\u003cffffffff812c4d37\u003e] kobject_put+0x27/0x60\n [\u003cffffffff813a21f7\u003e] put_device+0x17/0x20\n [\u003cffffffff81bda4f9\u003e] hci_free_dev+0x29/0x30\n [\u003cffffffff81928be6\u003e] vhci_release+0x36/0x70\n [\u003cffffffff810fb366\u003e] fput+0xd6/0x1f0\n [\u003cffffffff810f8fe6\u003e] filp_close+0x66/0x90\n [\u003cffffffff810f90a9\u003e] sys_close+0x99/0xf0\n [\u003cffffffff81d4c96b\u003e] system_call_fastpath+0x16/0x1b\n\nThat timer was introduced with commit 6bd32326cda(Bluetooth: Use\nproper timer for hci command timout)\n\nTimer seems to be running when the thing is closed. Removing the timer\nunconditionally fixes the problem. And yes, it needs to be fixed\nbefore the HCI_UP check.\n\nSigned-off-by: Thomas Gleixner \u003ctglx@linutronix.de\u003e\nTested-by: Ingo Molnar \u003cmingo@elte.hu\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "a0cc9a1b5712ea52aaa4e7abfa0ec2dbe0d820ff",
      "tree": "363e07ed161173be06e736ea4f38ef7b32b8ab94",
      "parents": [
        "6994ca5e8ade57d18b7d1e05aad040c441a2ad37"
      ],
      "author": {
        "name": "Andrei Emeltchenko",
        "email": "andrei.emeltchenko@nokia.com",
        "time": "Thu Mar 24 17:16:08 2011 +0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Mar 24 17:04:44 2011 -0300"
      },
      "message": "Bluetooth: delete hanging L2CAP channel\n\nSometimes L2CAP connection remains hanging. Make sure that\nL2CAP channel is deleted.\n\nSigned-off-by: Andrei Emeltchenko \u003candrei.emeltchenko@nokia.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "6994ca5e8ade57d18b7d1e05aad040c441a2ad37",
      "tree": "8a292dfc7e19c9ddeb605297aa3fcf89bca784f8",
      "parents": [
        "8763b4da41132e2d5a896cd5e629c3c0a652205e"
      ],
      "author": {
        "name": "Johan Hedberg",
        "email": "johan.hedberg@nokia.com",
        "time": "Wed Mar 16 14:29:34 2011 +0200"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Mar 24 17:04:44 2011 -0300"
      },
      "message": "Bluetooth: Fix missing hci_dev_lock_bh in user_confirm_reply\n\nThe code was correctly calling _unlock at the end of the function but\nthere was no actual _lock call anywhere.\n\nSigned-off-by: Johan Hedberg \u003cjohan.hedberg@nokia.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "f630cf0d5434e3923e1b8226ffa2753ead6b0ce5",
      "tree": "a53ed70a1e196b46a4c9c13320acf7bc1317fb03",
      "parents": [
        "52cb1c0d208565d8f06b743cdc6596d744f92e3b"
      ],
      "author": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Wed Mar 16 15:36:29 2011 -0300"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Mar 24 17:04:44 2011 -0300"
      },
      "message": "Bluetooth: Fix HCI_RESET command synchronization\n\nWe can\u0027t send new commands before a cmd_complete for the HCI_RESET command\nshows up.\n\nReported-by: Mikko Vinni \u003cmmvinni@yahoo.com\u003e\nReported-by: Justin P. Mattock \u003cjustinmattock@gmail.com\u003e\nReported-by: Ed Tomlinson \u003cedt@aei.ca\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\nTested-by: Justin P. Mattock \u003cjustinmattock@gmail.com\u003e\nTested-by: Mikko Vinni \u003cmmvinni@yahoo.com\u003e\nTested-by: Ed Tomlinson \u003cedt@aei.ca\u003e\n"
    },
    {
      "commit": "52cb1c0d208565d8f06b743cdc6596d744f92e3b",
      "tree": "b20b49167311a532ede5a806a1c81332dba5fecf",
      "parents": [
        "63a8588debd4dc72becb9e27add9343c76301c7d"
      ],
      "author": {
        "name": "Suraj Sumangala",
        "email": "suraj@atheros.com",
        "time": "Wed Mar 09 14:44:05 2011 +0530"
      },
      "committer": {
        "name": "Gustavo F. Padovan",
        "email": "padovan@profusion.mobi",
        "time": "Thu Mar 24 17:04:43 2011 -0300"
      },
      "message": "Bluetooth: Increment unacked_frames count only the first transmit\n\nThis patch lets \u0027l2cap_pinfo.unacked_frames\u0027 be incremented only\nthe first time a frame is transmitted.\n\nPreviously it was being incremented for retransmitted packets\ntoo resulting the value to cross the transmit window size.\n\nSigned-off-by: Suraj Sumangala \u003csuraj@atheros.com\u003e\nSigned-off-by: Gustavo F. Padovan \u003cpadovan@profusion.mobi\u003e\n"
    },
    {
      "commit": "fcd13f42c9d6ab7b1024b9b7125a2e8db3cc00b2",
      "tree": "2c088856e18636a77077cea244e227453782910c",
      "parents": [
        "6f71d7927c9a9efb7d7e9e6d227d5e246a9c5bd7"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Mar 24 07:01:24 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 24 11:49:54 2011 -0700"
      },
      "message": "ipv4: fix fib metrics\n\nAlessandro Suardi reported that we could not change route metrics :\n\nip ro change default .... advmss 1400\n\nThis regression came with commit 9c150e82ac50 (Allocate fib metrics\ndynamically). fib_metrics is no longer an array, but a pointer to an\narray.\n\nReported-by: Alessandro Suardi \u003calessandro.suardi@gmail.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nTested-by: Alessandro Suardi \u003calessandro.suardi@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8f70e95f9f4159184f557a1db60c909d7c1bd2e3",
      "tree": "80acf6fa7d35d29ba03798fb6745ad9791f965c9",
      "parents": [
        "7ebb931598cd95cccea10d4bc4c0123a464ea565"
      ],
      "author": {
        "name": "Bryan Schumaker",
        "email": "bjschuma@netapp.com",
        "time": "Thu Mar 24 17:12:31 2011 +0000"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Thu Mar 24 13:52:42 2011 -0400"
      },
      "message": "NFS: Determine initial mount security\n\nWhen sec\u003d\u003csomething\u003e is not presented as a mount option,\nwe should attempt to determine what security flavor the\nserver is using.\n\nSigned-off-by: Bryan Schumaker \u003cbjschuma@netapp.com\u003e\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\n"
    }
  ],
  "next": "7ebb931598cd95cccea10d4bc4c0123a464ea565"
}
