)]}'
{
  "log": [
    {
      "commit": "5306293c9cd2caf41849cc909281bda628bb989e",
      "tree": "3be4e8231e2772c8a43ddbef5c6a72c20b3054bb",
      "parents": [
        "dbd65a7e44fff4741a0b2c84bd6bace85d22c242",
        "66f41d4c5c8a5deed66fdcc84509376c9a0bf9d8"
      ],
      "author": {
        "name": "J. Bruce Fields",
        "email": "bfields@citi.umich.edu",
        "time": "Tue May 04 11:27:05 2010 -0400"
      },
      "committer": {
        "name": "J. Bruce Fields",
        "email": "bfields@citi.umich.edu",
        "time": "Tue May 04 11:29:05 2010 -0400"
      },
      "message": "Merge commit \u0027v2.6.34-rc6\u0027\n\nConflicts:\n\tfs/nfsd/nfs4callback.c\n"
    },
    {
      "commit": "b48fa6b99100dc7772af3cd276035fcec9719ceb",
      "tree": "415dba87c6c5de0ab85a8493f864838f4f3cc005",
      "parents": [
        "26c0c75e69265961e891ed80b38fb62a548ab371"
      ],
      "author": {
        "name": "Neil Brown",
        "email": "neilb@suse.de",
        "time": "Mon Mar 01 16:51:14 2010 +1100"
      },
      "committer": {
        "name": "J. Bruce Fields",
        "email": "bfields@citi.umich.edu",
        "time": "Mon May 03 08:33:00 2010 -0400"
      },
      "message": "sunrpc: centralise most calls to svc_xprt_received\n\nsvc_xprt_received must be called when -\u003expo_recvfrom has finished\nreceiving a message, so that the XPT_BUSY flag will be cleared and\nif necessary, requeued for further work.\n\nThis call is currently made in each -\u003expo_recvfrom function, often\nfrom multiple different points.  In each case it is the earliest point\non a particular path where it is known that the protection provided by\nXPT_BUSY is no longer needed.\n\nHowever there are (still) some error paths which do not call\nsvc_xprt_received, and requiring each -\u003expo_recvfrom to make the call\ndoes not encourage robustness.\n\nSo: move the svc_xprt_received call to be made just after the\ncall to -\u003expo_recvfrom(), and move it of the various -\u003expo_recvfrom\nmethods.\n\nThis means that it may not be called at the earliest possible instant,\nbut this is unlikely to be a measurable performance issue.\n\nNote that there are still other calls to svc_xprt_received as it is\nalso needed when an xprt is newly created.\n\nSigned-off-by: NeilBrown \u003cneilb@suse.de\u003e\nSigned-off-by: J. Bruce Fields \u003cbfields@citi.umich.edu\u003e\n"
    },
    {
      "commit": "27fb8d7b1fe7c2fa2d7c1f243b899793e1b080e0",
      "tree": "25a8ca59a3743459bbd48674731becea89a16318",
      "parents": [
        "f80a0ca6ad8f2800453e819dafa09a0ed9e56850",
        "9699eda6bc1f708a28acb716e1477aa351362fe2"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Apr 29 10:23:44 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Apr 29 10:23:44 2010 -0700"
      },
      "message": "Merge branch \u0027bugfixes\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6\n\n* \u0027bugfixes\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6:\n  nfs: fix memory leak in nfs_get_sb with CONFIG_NFS_V4\n  nfs: fix some issues in nfs41_proc_reclaim_complete()\n  NFS: Ensure that nfs_wb_page() waits for Pg_writeback to clear\n  NFS: Fix an unstable write data integrity race\n  nfs: testing for null instead of ERR_PTR()\n  NFS: rsize and wsize settings ignored on v4 mounts\n  NFSv4: Don\u0027t attempt an atomic open if the file is a mountpoint\n  SUNRPC: Fix a bug in rpcauth_prune_expired\n"
    },
    {
      "commit": "c0786693404cffd80ca3cb6e75ee7b35186b2825",
      "tree": "92a9026abbe71399c95330656af0f8c9d9c0019c",
      "parents": [
        "a8170c35e738d62e9919ce5b109cf4ed66e95bde"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Wed Apr 28 08:47:22 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 28 12:16:34 2010 -0700"
      },
      "message": "sctp: Fix oops when sending queued ASCONF chunks\n\nWhen we finish processing ASCONF_ACK chunk, we try to send\nthe next queued ASCONF.  This action runs the sctp state\nmachine recursively and it\u0027s not prepared to do so.\n\nkernel BUG at kernel/timer.c:790!\ninvalid opcode: 0000 [#1] SMP\nlast sysfs file: /sys/module/ipv6/initstate\nModules linked in: sha256_generic sctp libcrc32c ipv6 dm_multipath\nuinput 8139too i2c_piix4 8139cp mii i2c_core pcspkr virtio_net joydev\nfloppy virtio_blk virtio_pci [last unloaded: scsi_wait_scan]\n\nPid: 0, comm: swapper Not tainted 2.6.34-rc4 #15 /Bochs\nEIP: 0060:[\u003cc044a2ef\u003e] EFLAGS: 00010286 CPU: 0\nEIP is at add_timer+0xd/0x1b\nEAX: cecbab14 EBX: 000000f0 ECX: c0957b1c EDX: 03595cf4\nESI: cecba800 EDI: cf276f00 EBP: c0957aa0 ESP: c0957aa0\n DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068\nProcess swapper (pid: 0, ti\u003dc0956000 task\u003dc0988ba0 task.ti\u003dc0956000)\nStack:\n c0957ae0 d1851214 c0ab62e4 c0ab5f26 0500ffff 00000004 00000005 00000004\n\u003c0\u003e 00000000 d18694fd 00000004 1666b892 cecba800 cecba800 c0957b14\n00000004\n\u003c0\u003e c0957b94 d1851b11 ceda8b00 cecba800 cf276f00 00000001 c0957b14\n000000d0\nCall Trace:\n [\u003cd1851214\u003e] ? sctp_side_effects+0x607/0xdfc [sctp]\n [\u003cd1851b11\u003e] ? sctp_do_sm+0x108/0x159 [sctp]\n [\u003cd1863386\u003e] ? sctp_pname+0x0/0x1d [sctp]\n [\u003cd1861a56\u003e] ? sctp_primitive_ASCONF+0x36/0x3b [sctp]\n [\u003cd185657c\u003e] ? sctp_process_asconf_ack+0x2a4/0x2d3 [sctp]\n [\u003cd184e35c\u003e] ? sctp_sf_do_asconf_ack+0x1dd/0x2b4 [sctp]\n [\u003cd1851ac1\u003e] ? sctp_do_sm+0xb8/0x159 [sctp]\n [\u003cd1863334\u003e] ? sctp_cname+0x0/0x52 [sctp]\n [\u003cd1854377\u003e] ? sctp_assoc_bh_rcv+0xac/0xe1 [sctp]\n [\u003cd1858f0f\u003e] ? sctp_inq_push+0x2d/0x30 [sctp]\n [\u003cd186329d\u003e] ? sctp_rcv+0x797/0x82e [sctp]\n\nTested-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: Yuansong Qiao \u003cysqiao@research.ait.ie\u003e\nSigned-off-by: Shuaijun Zhang \u003cszhang@research.ait.ie\u003e\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a8170c35e738d62e9919ce5b109cf4ed66e95bde",
      "tree": "72abf999ebe24d308175ad1410e12de056268dd3",
      "parents": [
        "81419d862db743fe4450a021893f24bab4698c1d"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Wed Apr 28 08:47:21 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 28 12:16:33 2010 -0700"
      },
      "message": "sctp: fix to calc the INIT/INIT-ACK chunk length correctly is set\n\nWhen calculating the INIT/INIT-ACK chunk length, we should not\nonly account the length of parameters, but also the parameters\nzero padding length, such as AUTH HMACS parameter and CHUNKS\nparameter. Without the parameters zero padding length we may get\nfollowing oops.\n\nskb_over_panic: text:ce2068d2 len:130 put:6 head:cac3fe00 data:cac3fe00 tail:0xcac3fe82 end:0xcac3fe80 dev:\u003cNULL\u003e\n------------[ cut here ]------------\nkernel BUG at net/core/skbuff.c:127!\ninvalid opcode: 0000 [#2] SMP\nlast sysfs file: /sys/module/aes_generic/initstate\nModules linked in: authenc ......\n\nPid: 4102, comm: sctp_darn Tainted: G      D    2.6.34-rc2 #6\nEIP: 0060:[\u003cc0607630\u003e] EFLAGS: 00010282 CPU: 0\nEIP is at skb_over_panic+0x37/0x3e\nEAX: 00000078 EBX: c07c024b ECX: c07c02b9 EDX: cb607b78\nESI: 00000000 EDI: cac3fe7a EBP: 00000002 ESP: cb607b74\n DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068\nProcess sctp_darn (pid: 4102, ti\u003dcb607000 task\u003dcabdc990 task.ti\u003dcb607000)\nStack:\n c07c02b9 ce2068d2 00000082 00000006 cac3fe00 cac3fe00 cac3fe82 cac3fe80\n\u003c0\u003e c07c024b cac3fe7c cac3fe7a c0608dec ca986e80 ce2068d2 00000006 0000007a\n\u003c0\u003e cb8120ca ca986e80 cb812000 00000003 cb8120c4 ce208a25 cb8120ca cadd9400\nCall Trace:\n [\u003cce2068d2\u003e] ? sctp_addto_chunk+0x45/0x85 [sctp]\n [\u003cc0608dec\u003e] ? skb_put+0x2e/0x32\n [\u003cce2068d2\u003e] ? sctp_addto_chunk+0x45/0x85 [sctp]\n [\u003cce208a25\u003e] ? sctp_make_init+0x279/0x28c [sctp]\n [\u003cc0686a92\u003e] ? apic_timer_interrupt+0x2a/0x30\n [\u003cce1fdc0b\u003e] ? sctp_sf_do_prm_asoc+0x2b/0x7b [sctp]\n [\u003cce202823\u003e] ? sctp_do_sm+0xa0/0x14a [sctp]\n [\u003cce2133b9\u003e] ? sctp_pname+0x0/0x14 [sctp]\n [\u003cce211d72\u003e] ? sctp_primitive_ASSOCIATE+0x2b/0x31 [sctp]\n [\u003cce20f3cf\u003e] ? sctp_sendmsg+0x7a0/0x9eb [sctp]\n [\u003cc064eb1e\u003e] ? inet_sendmsg+0x3b/0x43\n [\u003cc04244b7\u003e] ? task_tick_fair+0x2d/0xd9\n [\u003cc06031e1\u003e] ? sock_sendmsg+0xa7/0xc1\n [\u003cc0416afe\u003e] ? smp_apic_timer_interrupt+0x6b/0x75\n [\u003cc0425123\u003e] ? dequeue_task_fair+0x34/0x19b\n [\u003cc0446abb\u003e] ? sched_clock_local+0x17/0x11e\n [\u003cc052ea87\u003e] ? _copy_from_user+0x2b/0x10c\n [\u003cc060ab3a\u003e] ? verify_iovec+0x3c/0x6a\n [\u003cc06035ca\u003e] ? sys_sendmsg+0x186/0x1e2\n [\u003cc042176b\u003e] ? __wake_up_common+0x34/0x5b\n [\u003cc04240c2\u003e] ? __wake_up+0x2c/0x3b\n [\u003cc057e35c\u003e] ? tty_wakeup+0x43/0x47\n [\u003cc04430f2\u003e] ? remove_wait_queue+0x16/0x24\n [\u003cc0580c94\u003e] ? n_tty_read+0x5b8/0x65e\n [\u003cc042be02\u003e] ? default_wake_function+0x0/0x8\n [\u003cc0604e0e\u003e] ? sys_socketcall+0x17f/0x1cd\n [\u003cc040264c\u003e] ? sysenter_do_call+0x12/0x22\nCode: 0f 45 de 53 ff b0 98 00 00 00 ff b0 94 ......\nEIP: [\u003cc0607630\u003e] skb_over_panic+0x37/0x3e SS:ESP 0068:cb607b74\n\nTo reproduce:\n\n# modprobe sctp\n# echo 1 \u003e /proc/sys/net/sctp/addip_enable\n# echo 1 \u003e /proc/sys/net/sctp/auth_enable\n# sctp_test -H 3ffe:501:ffff:100:20c:29ff:fe4d:f37e -P 800 -l\n# sctp_darn -H 3ffe:501:ffff:100:20c:29ff:fe4d:f37e -P 900 -h 192.168.0.21 -p 800 -I -s -t\nsctp_darn ready to send...\n3ffe:501:ffff:100:20c:29ff:fe4d:f37e:900-192.168.0.21:800 Interactive mode\u003e bindx-add\u003d192.168.0.21\n3ffe:501:ffff:100:20c:29ff:fe4d:f37e:900-192.168.0.21:800 Interactive mode\u003e bindx-add\u003d192.168.1.21\n3ffe:501:ffff:100:20c:29ff:fe4d:f37e:900-192.168.0.21:800 Interactive mode\u003e snd\u003d10\n\n------------------------------------------------------------------\neth0 has addresses: 3ffe:501:ffff:100:20c:29ff:fe4d:f37e and 192.168.0.21\neth1 has addresses: 192.168.1.21\n------------------------------------------------------------------\n\nReported-by: George Cheimonidis \u003cgchimon@gmail.com\u003e\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "81419d862db743fe4450a021893f24bab4698c1d",
      "tree": "01e1624bc38ba93dcc365c4c09e6235fb95c7c9b",
      "parents": [
        "0c42749cffbb4a06be86c5e5db6c7ebad548781f"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Wed Apr 28 08:47:20 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 28 12:16:33 2010 -0700"
      },
      "message": "sctp: per_cpu variables should be in bh_disabled section\n\nSince the change of the atomics to percpu variables, we now\nhave to disable BH in process context when touching percpu variables.\n\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0c42749cffbb4a06be86c5e5db6c7ebad548781f",
      "tree": "5b497b337457540b78c221fc173dbb634858a7a1",
      "parents": [
        "561b1733a465cf9677356b40c27653dd45f1ac56"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Wed Apr 28 08:47:19 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 28 12:16:32 2010 -0700"
      },
      "message": "sctp: fix potential reference of a freed pointer\n\nWhen sctp attempts to update an assocition, it removes any\naddresses that were not in the updated INITs.  However, the loop\nmay attempt to refrence a transport with address after removing it.\n\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "561b1733a465cf9677356b40c27653dd45f1ac56",
      "tree": "86d6720a6497a0b3faa9685596d4f85d3858b6fe",
      "parents": [
        "8d238b25b1ec22a73b1c2206f111df2faaff8285"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Wed Apr 28 08:47:18 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 28 12:16:31 2010 -0700"
      },
      "message": "sctp: avoid irq lock inversion while call sk-\u003esk_data_ready()\n\nsk-\u003esk_data_ready() of sctp socket can be called from both BH and non-BH\ncontexts, but the default sk-\u003esk_data_ready(), sock_def_readable(), can\nnot be used in this case. Therefore, we have to make a new function\nsctp_data_ready() to grab sk-\u003esk_data_ready() with BH disabling.\n\n\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n[ INFO: possible irq lock inversion dependency detected ]\n2.6.33-rc6 #129\n---------------------------------------------------------\nsctp_darn/1517 just changed the state of lock:\n (clock-AF_INET){++.?..}, at: [\u003cc06aab60\u003e] sock_def_readable+0x20/0x80\nbut this lock took another, SOFTIRQ-unsafe lock in the past:\n (slock-AF_INET){+.-...}\n\nand interrupts could create inverse lock ordering between them.\n\nother info that might help us debug this:\n1 lock held by sctp_darn/1517:\n #0:  (sk_lock-AF_INET){+.+.+.}, at: [\u003ccdfe363d\u003e] sctp_sendmsg+0x23d/0xc00 [sctp]\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8d238b25b1ec22a73b1c2206f111df2faaff8285",
      "tree": "bc0c6da1df80e826f47588744ebfded7f1949a95",
      "parents": [
        "eb4fd8cd355c8ec425a12ec6cbdac614e8a4819d"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 28 11:25:59 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 28 11:25:59 2010 -0700"
      },
      "message": "Revert \"tcp: bind() fix when many ports are bound\"\n\nThis reverts two commits:\n\nfda48a0d7a8412cedacda46a9c0bf8ef9cd13559\ntcp: bind() fix when many ports are bound\n\nand a follow-on fix for it:\n\n6443bb1fc2050ca2b6585a3fa77f7833b55329ed\nipv6: Fix inet6_csk_bind_conflict()\n\nIt causes problems with binding listening sockets when time-wait\nsockets from a previous instance still are alive.\n\nIt\u0027s too late to keep fiddling with this so late in the -rc\nseries, and we\u0027ll deal with it in net-next-2.6 instead.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "477fffb082920476cc26f238d65538ccb8d601e1",
      "tree": "3e49749f9c654b09699bb872c4611f71a3ed70d4",
      "parents": [
        "761ed01b35ca32bfd4166cc3862ae80ee33e3a4b"
      ],
      "author": {
        "name": "Dan Carpenter",
        "email": "error27@gmail.com",
        "time": "Wed Apr 21 23:52:01 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 27 17:03:36 2010 -0700"
      },
      "message": "bluetooth: handle l2cap_create_connless_pdu() errors\n\nl2cap_create_connless_pdu() can sometimes return ERR_PTR(-ENOMEM) or\nERR_PTR(-EFAULT).\n\nSigned-off-by: Dan Carpenter \u003cerror27@gmail.com\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4eb8b9031a0314539605733597b1e30222d4da70",
      "tree": "2d5db34c06d9876aef6a0531bf1e0f368c692cd4",
      "parents": [
        "93c0c8b4a5a174645550d444bd5c3ff0cccf74cb"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki / 吉藤英明",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Sun Apr 25 08:59:07 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 26 11:25:31 2010 -0700"
      },
      "message": "bridge br_multicast: Ensure to initialize BR_INPUT_SKB_CB(skb)-\u003emrouters_only.\n\nEven with commit 32dec5dd0233ebffa9cae25ce7ba6daeb7df4467 (\"bridge\nbr_multicast: Don\u0027t refer to BR_INPUT_SKB_CB(skb)-\u003emrouters_only\nwithout IGMP snooping.\"), BR_INPUT_SKB_CB(skb)-\u003emrouters_only is\nnot appropriately initialized if IGMP snooping support is\ncompiled and disabled, so we can see garbage.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "93c0c8b4a5a174645550d444bd5c3ff0cccf74cb",
      "tree": "e84e611cea672cb2354ebfcaad11d6a22ead4b04",
      "parents": [
        "dc8bf1b1a6edfc92465526de19772061302f0929"
      ],
      "author": {
        "name": "Stefan Schmidt",
        "email": "stefan@datenfreihafen.org",
        "time": "Mon Apr 26 11:20:32 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 26 11:20:32 2010 -0700"
      },
      "message": "ieee802154: Fix oops during ieee802154_sock_ioctl\n\nTrying to run izlisten (from lowpan-tools tests) on a device that does not\nexists I got the oops below. The problem is that we are using get_dev_by_name\nwithout checking if we really get a device back. We don\u0027t in this case and\nwriting to dev-\u003etype generates this oops.\n\n[Oops code removed by Dmitry Eremin-Solenikov]\n\nIf possible this patch should be applied to the current -rc fixes branch.\n\nSigned-off-by: Stefan Schmidt \u003cstefan@datenfreihafen.org\u003e\nSigned-off-by: Dmitry Eremin-Solenikov \u003cdbaryshkov@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6443bb1fc2050ca2b6585a3fa77f7833b55329ed",
      "tree": "1a6634f8a857fb3ef050ef37fd467ac138efe5d8",
      "parents": [
        "401da6aea31ef69c2fcd260382adabdcf7ce820a"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Sun Apr 25 15:09:42 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Apr 25 15:09:42 2010 -0700"
      },
      "message": "ipv6: Fix inet6_csk_bind_conflict()\n\nCommit fda48a0d7a84 (tcp: bind() fix when many ports are bound)\nintroduced a bug on IPV6 part.\nWe should not call ipv6_addr_any(inet6_rcv_saddr(sk2)) but\nipv6_addr_any(inet6_rcv_saddr(sk)) because sk2 can be IPV4, while sk is\nIPV6.\n\nReported-by: Michael S. Tsirkin \u003cmst@redhat.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nTested-by: Michael S. Tsirkin \u003cmst@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fda48a0d7a8412cedacda46a9c0bf8ef9cd13559",
      "tree": "f749b26dea4353c6f3bd95e49fafceb06623c20b",
      "parents": [
        "24acc6895616b373475e92e49925efc3ef591563"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed Apr 21 09:26:15 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 22 19:06:06 2010 -0700"
      },
      "message": "tcp: bind() fix when many ports are bound\n\nPort autoselection done by kernel only works when number of bound\nsockets is under a threshold (typically 30000).\n\nWhen this threshold is over, we must check if there is a conflict before\nexiting first loop in inet_csk_get_port()\n\nChange inet_csk_bind_conflict() to forbid two reuse-enabled sockets to\nbind on same (address,port) tuple (with a non ANY address)\n\nSame change for inet6_csk_bind_conflict()\n\nReported-by: Gaspar Chilingarov \u003cgasparch@gmail.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nAcked-by: Evgeniy Polyakov \u003czbr@ioremap.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "24acc6895616b373475e92e49925efc3ef591563",
      "tree": "69cbd3f262881d42602e99377faac584c3b2d8d0",
      "parents": [
        "80032cffb95edff4fc216b1cb21682257be326b7"
      ],
      "author": {
        "name": "Dan Carpenter",
        "email": "error27@gmail.com",
        "time": "Wed Apr 21 23:55:27 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 22 15:57:26 2010 -0700"
      },
      "message": "rdma: potential ERR_PTR dereference\n\nIn the original code, the \"goto out\" calls \"rdma_destroy_id(cm_id);\"\nThat isn\u0027t needed here and would cause problems because \"cm_id\" is an\nERR_PTR.  The new code just returns directly.\n\nSigned-off-by: Dan Carpenter \u003cerror27@gmail.com\u003e\nAcked-by: Andy Grover \u003candy.grover@oracle.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "80032cffb95edff4fc216b1cb21682257be326b7",
      "tree": "e058d007a9db28dcb61a5903b6d79e5e6b96f0c3",
      "parents": [
        "f4f914b58019f0e50d521bbbadfaee260d766f95"
      ],
      "author": {
        "name": "Dan Carpenter",
        "email": "error27@gmail.com",
        "time": "Wed Apr 21 23:53:27 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 22 15:57:26 2010 -0700"
      },
      "message": "rtnetlink: potential ERR_PTR dereference\n\nIn the original code, if rtnl_create_link() returned an ERR_PTR then that\nwould get passed to rtnl_configure_link() which dereferences it.\n\nSigned-off-by: Dan Carpenter \u003cerror27@gmail.com\u003e\nAcked-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3d7b08945e54a3a5358d5890240619a013cb7388",
      "tree": "fc255ee6b91875e623200aa5b3f59fe58cc3e456",
      "parents": [
        "c81eddb0e3728661d1585fbc564449c94165cc36"
      ],
      "author": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Thu Apr 22 15:35:55 2010 -0400"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Thu Apr 22 15:35:55 2010 -0400"
      },
      "message": "SUNRPC: Fix a bug in rpcauth_prune_expired\n\nDon\u0027t want to evict a credential if cred-\u003ecr_expire \u003d\u003d jiffies, since that\nmeans that it was just placed on the cred_unused list. We therefore need to\nuse time_in_range() rather than time_in_range_open().\n\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\n"
    },
    {
      "commit": "f4f914b58019f0e50d521bbbadfaee260d766f95",
      "tree": "7a9690cf187a0b2c0f7583f94668ef307690c9bb",
      "parents": [
        "f2228f785a9d97307aa8ba709088cfda6c3df73f"
      ],
      "author": {
        "name": "Jiri Olsa",
        "email": "jolsa@redhat.com",
        "time": "Tue Apr 20 21:21:26 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 21 22:59:24 2010 -0700"
      },
      "message": "net: ipv6 bind to device issue\n\nThe issue raises when having 2 NICs both assigned the same\nIPv6 global address.\n\nIf a sender binds to a particular NIC (SO_BINDTODEVICE),\nthe outgoing traffic is being sent via the first found.\nThe bonded device is thus not taken into an account during the\nrouting.\n\nFrom the ip6_route_output function:\n\nIf the binding address is multicast, linklocal or loopback,\nthe RT6_LOOKUP_F_IFACE bit is set, but not for global address.\n\nSo binding global address will neglect SO_BINDTODEVICE-binded device,\nbecause the fib6_rule_lookup function path won\u0027t check for the\nflowi::oif field and take first route that fits.\n\nSigned-off-by: Jiri Olsa \u003cjolsa@redhat.com\u003e\nSigned-off-by: Scott Otto \u003cscott.otto@alcatel-lucent.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f2228f785a9d97307aa8ba709088cfda6c3df73f",
      "tree": "3440546af96613f8204221128609bf8054a8e733",
      "parents": [
        "a19259c3d589a014e5f47f148f74dfc44422c82b"
      ],
      "author": {
        "name": "Shan Wei",
        "email": "shanwei@cn.fujitsu.com",
        "time": "Sun Apr 18 16:58:22 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 21 22:48:26 2010 -0700"
      },
      "message": "ipv6: allow to send packet after receiving ICMPv6 Too Big message with MTU field less than IPV6_MIN_MTU\n\nAccording to RFC2460, PMTU is set to the IPv6 Minimum Link\nMTU (1280) and a fragment header should always be included\nafter a node receiving Too Big message reporting PMTU is\nless than the IPv6 Minimum Link MTU.\n\nAfter receiving a ICMPv6 Too Big message reporting PMTU is\nless than the IPv6 Minimum Link MTU, sctp *can\u0027t* send any\ndata/control chunk that total length including IPv6 head\nand IPv6 extend head is less than IPV6_MIN_MTU(1280 bytes).\n\nThe failure occured in p6_fragment(), about reason\nsee following(take SHUTDOWN chunk for example):\nsctp_packet_transmit (SHUTDOWN chunk, len\u003d16 byte)\n|------sctp_v6_xmit (local_df\u003d0)\n   |------ip6_xmit\n       |------ip6_output (dst_allfrag is ture)\n           |------ip6_fragment\n\nIn ip6_fragment(), for local_df\u003d0, drops the the packet\nand returns EMSGSIZE.\n\nThe patch fixes it with adding check length of skb-\u003elen.\nIn this case, Ipv6 not to fragment upper protocol data,\njust only add a fragment header before it.\n\nSigned-off-by: Shan Wei \u003cshanwei@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2cec6b014da6fb4a40ba1c6556cdf9681ed3f89e",
      "tree": "812d44f58c5b0a596db203d75bfd7891d884b8b1",
      "parents": [
        "761172fbf672c5784b2a0d71ca2f4389eb7a2c21"
      ],
      "author": {
        "name": "andrew hendry",
        "email": "andrew.hendry@gmail.com",
        "time": "Sat Apr 17 14:17:32 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 21 16:31:50 2010 -0700"
      },
      "message": "X25 fix dead unaccepted sockets\n\n1, An X25 program binds and listens\n2, calls arrive waiting to be accepted\n3, Program exits without accepting\n4, Sockets time out but don\u0027t get correctly cleaned up\n5, cat /proc/net/x25/socket shows the dead sockets with bad inode fields.\n\nThis line borrowed from AX25 sets the dying socket so the timers clean up later.\n\nSigned-off-by: Andrew Hendry \u003candrew.hendry@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "bc8e4b954e463716a57d8113dd50ae9d47b682a7",
      "tree": "41a2b898ae8d269da8b1d8e649e5711356d49ee3",
      "parents": [
        "1c0b28b1ee90261a0a27194e6684dd2837785064"
      ],
      "author": {
        "name": "Nicolas Dichtel",
        "email": "nicolas.dichtel@6wind.com",
        "time": "Wed Apr 21 16:25:30 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 21 16:25:30 2010 -0700"
      },
      "message": "xfrm6: ensure to use the same dev when building a bundle\n\nWhen building a bundle, we set dst.dev and rt6.rt6i_idev.\nWe must ensure to set the same device for both fields.\n\nSigned-off-by: Nicolas Dichtel \u003cnicolas.dichtel@6wind.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "05d17608a69b3ae653ea5c9857283bef3439c733",
      "tree": "89f847bb0a1107f621387c64f332b2a25e8829b5",
      "parents": [
        "e04997b13a2c2fc93af970fe95fd29a74db113e8"
      ],
      "author": {
        "name": "David Howells",
        "email": "dhowells@redhat.com",
        "time": "Tue Apr 20 00:25:58 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 21 01:09:44 2010 -0700"
      },
      "message": "net: Fix an RCU warning in dev_pick_tx()\n\nFix the following RCU warning in dev_pick_tx():\n\n\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n[ INFO: suspicious rcu_dereference_check() usage. ]\n---------------------------------------------------\nnet/core/dev.c:1993 invoked rcu_dereference_check() without protection!\n\nother info that might help us debug this:\n\nrcu_scheduler_active \u003d 1, debug_locks \u003d 0\n2 locks held by swapper/0:\n #0:  (\u0026idev-\u003emc_ifc_timer){+.-...}, at: [\u003cffffffff81039e65\u003e] run_timer_softirq+0x17b/0x278\n #1:  (rcu_read_lock_bh){.+....}, at: [\u003cffffffff812ea3eb\u003e] dev_queue_xmit+0x14e/0x4dc\n\nstack backtrace:\nPid: 0, comm: swapper Not tainted 2.6.34-rc5-cachefs #4\nCall Trace:\n \u003cIRQ\u003e  [\u003cffffffff810516c4\u003e] lockdep_rcu_dereference+0xaa/0xb2\n [\u003cffffffff812ea4f6\u003e] dev_queue_xmit+0x259/0x4dc\n [\u003cffffffff812ea3eb\u003e] ? dev_queue_xmit+0x14e/0x4dc\n [\u003cffffffff81052324\u003e] ? trace_hardirqs_on+0xd/0xf\n [\u003cffffffff81035362\u003e] ? local_bh_enable_ip+0xbc/0xc1\n [\u003cffffffff812f0954\u003e] neigh_resolve_output+0x24b/0x27c\n [\u003cffffffff8134f673\u003e] ip6_output_finish+0x7c/0xb4\n [\u003cffffffff81350c34\u003e] ip6_output2+0x256/0x261\n [\u003cffffffff81052324\u003e] ? trace_hardirqs_on+0xd/0xf\n [\u003cffffffff813517fb\u003e] ip6_output+0xbbc/0xbcb\n [\u003cffffffff8135bc5d\u003e] ? fib6_force_start_gc+0x2b/0x2d\n [\u003cffffffff81368acb\u003e] mld_sendpack+0x273/0x39d\n [\u003cffffffff81368858\u003e] ? mld_sendpack+0x0/0x39d\n [\u003cffffffff81052099\u003e] ? mark_held_locks+0x52/0x70\n [\u003cffffffff813692fc\u003e] mld_ifc_timer_expire+0x24f/0x288\n [\u003cffffffff81039ed6\u003e] run_timer_softirq+0x1ec/0x278\n [\u003cffffffff81039e65\u003e] ? run_timer_softirq+0x17b/0x278\n [\u003cffffffff813690ad\u003e] ? mld_ifc_timer_expire+0x0/0x288\n [\u003cffffffff81035531\u003e] ? __do_softirq+0x69/0x140\n [\u003cffffffff8103556a\u003e] __do_softirq+0xa2/0x140\n [\u003cffffffff81002e0c\u003e] call_softirq+0x1c/0x28\n [\u003cffffffff81004b54\u003e] do_softirq+0x38/0x80\n [\u003cffffffff81034f06\u003e] irq_exit+0x45/0x47\n [\u003cffffffff810177c3\u003e] smp_apic_timer_interrupt+0x88/0x96\n [\u003cffffffff810028d3\u003e] apic_timer_interrupt+0x13/0x20\n \u003cEOI\u003e  [\u003cffffffff810488dd\u003e] ? __atomic_notifier_call_chain+0x0/0x86\n [\u003cffffffff810096bf\u003e] ? mwait_idle+0x6e/0x78\n [\u003cffffffff810096b6\u003e] ? mwait_idle+0x65/0x78\n [\u003cffffffff810011cb\u003e] cpu_idle+0x4d/0x83\n [\u003cffffffff81380b05\u003e] rest_init+0xb9/0xc0\n [\u003cffffffff81380a4c\u003e] ? rest_init+0x0/0xc0\n [\u003cffffffff8168dcf0\u003e] start_kernel+0x392/0x39d\n [\u003cffffffff8168d2a3\u003e] x86_64_start_reservations+0xb3/0xb7\n [\u003cffffffff8168d38b\u003e] x86_64_start_kernel+0xe4/0xeb\n\nAn rcu_dereference() should be an rcu_dereference_bh().\n\nSigned-off-by: David Howells \u003cdhowells@redhat.com\u003e\nAcked-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e04997b13a2c2fc93af970fe95fd29a74db113e8",
      "tree": "a84ec3368edc3c2568a0d6acdfa0d0e50d8cacf7",
      "parents": [
        "6651ffc8e8bdd5fb4b7d1867c6cfebb4f309512c",
        "05ce7bfe547c9fa967d9cab6c37867a9cb6fb3fa"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 21 00:50:39 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 21 00:50:39 2010 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of /home/davem/src/GIT/linux-2.6/\n"
    },
    {
      "commit": "6651ffc8e8bdd5fb4b7d1867c6cfebb4f309512c",
      "tree": "e2add54e43e43c36fd3cff6fdd4890c98a83c60b",
      "parents": [
        "8eabf95cb17253a3ac72b1a62ce8a80b3efecd62"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Apr 21 00:47:15 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 21 00:47:15 2010 -0700"
      },
      "message": "ipv6: Fix tcp_v6_send_response transport header setting.\n\nMy recent patch to remove the open-coded checksum sequence in\ntcp_v6_send_response broke it as we did not set the transport\nheader pointer on the new packet.\n\nActually, there is code there trying to set the transport\nheader properly, but it sets it for the wrong skb (\u0027skb\u0027\ninstead of \u0027buff\u0027).\n\nThis bug was introduced by commit\na8fdf2b331b38d61fb5f11f3aec4a4f9fb2dedcb (\"ipv6: Fix\ntcp_v6_send_response(): it didn\u0027t set skb transport header\")\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8eabf95cb17253a3ac72b1a62ce8a80b3efecd62",
      "tree": "bed6cb45424195ce5dae4c92948e69cd04786e5d",
      "parents": [
        "e46754f8c9333170f11780d8e3a70da1b1a88338"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Tue Apr 20 03:20:05 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 20 18:51:57 2010 -0700"
      },
      "message": "bridge: add a missing ntohs()\n\ngrec_nsrcs is in network order, we should convert to host horder in\nbr_multicast_igmp3_report()\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e46754f8c9333170f11780d8e3a70da1b1a88338",
      "tree": "9b7ac1c7cb4c147c69767908c6dcb7633fb03f12",
      "parents": [
        "ef9e83c1ab2981769f16e626179dd56895041b38",
        "fe6f212ce12341df18ef9b890bea739b4547157b"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 20 17:57:56 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 20 17:57:56 2010 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "fe6f212ce12341df18ef9b890bea739b4547157b",
      "tree": "a8ac4d32c86d590b28e39866b1533d4a1b4ac1ba",
      "parents": [
        "b4bb5c3fd9333024044362df67e23e96158489ed"
      ],
      "author": {
        "name": "Reinette Chatre",
        "email": "reinette.chatre@intel.com",
        "time": "Mon Apr 19 10:46:31 2010 -0700"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Apr 19 16:34:11 2010 -0400"
      },
      "message": "mac80211: pass HT changes to driver when off channel\n\nSince \"mac80211: make off-channel work generic\" drivers have not been\nnotified of configuration changes after association or authentication. This\ncaused more dependence on current state to ensure driver will be notified\nwhen configuration changes occur. One such problem arises if off-channel is\nin progress when HT information changes. Since HT is only enabled on the\n\"oper_channel\" the driver will never be notified of this change. Usually\nthe driver is notified soon after of a BSS information change\n(BSS_CHANGED_HT) ... but since the driver did not get a notification that\nthis is a HT channel the new BSS information does not make sense.\n\nFix this by also changing the off-channel information when HT is enabled\nand thus cause driver to be notified correctly.\n\nThis fixes a problem in 4965 when associated with 5GHz 40MHz channel.\nWithout this patch the system can associate but is unable to transfer any\ndata, not even ping.\n\nSee http://bugzilla.intellinuxwireless.org/show_bug.cgi?id\u003d2158\n\nSigned-off-by: Reinette Chatre \u003creinette.chatre@intel.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "b4bb5c3fd9333024044362df67e23e96158489ed",
      "tree": "180405311d50e63ac6f6dd67eefefeb2c2c110bc",
      "parents": [
        "f2fa1b015e9c199e45c836c769d94db595150731"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Mon Apr 19 10:48:38 2010 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Apr 19 16:34:11 2010 -0400"
      },
      "message": "mac80211: remove bogus TX agg state assignment\n\nWhen the addba timer expires but has no work to do,\nit should not affect the state machine. If it does,\nTX will not see the successfully established and we\ncan also crash trying to re-establish the session.\n\nCc: stable@kernel.org [2.6.32, 2.6.33]\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "375db4810b27306ea400ab39d3d6f7a063ac9ff6",
      "tree": "f2cb778036dbfcade394c9e5ad94a69137fd352c",
      "parents": [
        "73c6c7fbb74d07a80fee41ce4ca3976547519e42",
        "b91ecb0027c7171c83d7cf443a22c39b1fde6d83"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Apr 19 07:27:45 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Apr 19 07:27:45 2010 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6:\n  gigaset: include cleanup cleanup\n  packet : remove init_net restriction\n  WAN: flush tx_queue in hdlc_ppp to prevent panic on rmmod hw_driver.\n  ip: Fix ip_dev_loopback_xmit()\n  net: dev_pick_tx() fix\n  fib: suppress lockdep-RCU false positive in FIB trie.\n  tun: orphan an skb on tx\n  forcedeth: fix tx limit2 flag check\n  iwlwifi: work around bogus active chains detection\n"
    },
    {
      "commit": "1c4f0197323254e463b642abf2c8361e2a924859",
      "tree": "5dc70f6fc0baabe81f50fec965dd0d66dd772a21",
      "parents": [
        "31f634a63de7068c6a5dcb0d7b09b24b61a5cf88"
      ],
      "author": {
        "name": "Daniel Lezcano",
        "email": "daniel.lezcano@free.fr",
        "time": "Wed Apr 14 23:11:14 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Apr 16 15:41:04 2010 -0700"
      },
      "message": "packet : remove init_net restriction\n\nThe af_packet protocol is used by Perl to do ioctls as reported by\nStephane Riviere:\n\n\"Net::RawIP relies on SIOCGIFADDR et SIOCGIFHWADDR to get the IP and MAC\naddresses of the network interface.\"\n\nBut in a new network namespace these ioctl fail because it is disabled for\na namespace different from the init_net_ns.\n\nThese two lines should not be there as af_inet and af_packet are\nnamespace aware since a long time now. I suppose we forget to remove these\nlines because we sent the af_packet first, before af_inet was supported.\n\nSigned-off-by: Daniel Lezcano \u003cdaniel.lezcano@free.fr\u003e\nReported-by: Stephane Riviere \u003cstephane.riviere@regis-dgac.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e30b38c298b55e09456d3ccbc1df2f3e2e8dc6e9",
      "tree": "53511f6512335d9cc009593f5c820957f8aa6185",
      "parents": [
        "8728c544a9cbdcb0034aa5c45706c5f953f030ee"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Apr 15 09:13:03 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 15 14:25:22 2010 -0700"
      },
      "message": "ip: Fix ip_dev_loopback_xmit()\n\nEric Paris got following trace with a linux-next kernel\n\n[   14.203970] BUG: using smp_processor_id() in preemptible [00000000]\ncode: avahi-daemon/2093\n[   14.204025] caller is netif_rx+0xfa/0x110\n[   14.204035] Call Trace:\n[   14.204064]  [\u003cffffffff81278fe5\u003e] debug_smp_processor_id+0x105/0x110\n[   14.204070]  [\u003cffffffff8142163a\u003e] netif_rx+0xfa/0x110\n[   14.204090]  [\u003cffffffff8145b631\u003e] ip_dev_loopback_xmit+0x71/0xa0\n[   14.204095]  [\u003cffffffff8145b892\u003e] ip_mc_output+0x192/0x2c0\n[   14.204099]  [\u003cffffffff8145d610\u003e] ip_local_out+0x20/0x30\n[   14.204105]  [\u003cffffffff8145d8ad\u003e] ip_push_pending_frames+0x28d/0x3d0\n[   14.204119]  [\u003cffffffff8147f1cc\u003e] udp_push_pending_frames+0x14c/0x400\n[   14.204125]  [\u003cffffffff814803fc\u003e] udp_sendmsg+0x39c/0x790\n[   14.204137]  [\u003cffffffff814891d5\u003e] inet_sendmsg+0x45/0x80\n[   14.204149]  [\u003cffffffff8140af91\u003e] sock_sendmsg+0xf1/0x110\n[   14.204189]  [\u003cffffffff8140dc6c\u003e] sys_sendmsg+0x20c/0x380\n[   14.204233]  [\u003cffffffff8100ad82\u003e] system_call_fastpath+0x16/0x1b\n\nWhile current linux-2.6 kernel doesnt emit this warning, bug is latent\nand might cause unexpected failures.\n\nip_dev_loopback_xmit() runs in process context, preemption enabled, so\nmust call netif_rx_ni() instead of netif_rx(), to make sure that we\nprocess pending software interrupt.\n\nSame change for ip6_dev_loopback_xmit()\n\nReported-by: Eric Paris \u003ceparis@redhat.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8728c544a9cbdcb0034aa5c45706c5f953f030ee",
      "tree": "81fa8933b6769983063db89da3242aabbf816135",
      "parents": [
        "4eaa0e3c869acd5dbc7c2e3818a9ae9cbf221d27"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Sun Apr 11 21:18:17 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 15 01:27:11 2010 -0700"
      },
      "message": "net: dev_pick_tx() fix\n\nWhen dev_pick_tx() caches tx queue_index on a socket, we must check\nsocket dst_entry matches skb one, or risk a crash later, as reported by\nDenys Fedorysychenko, if old packets are in flight during a route\nchange, involving devices with different number of queues.\n\nBug introduced by commit a4ee3ce3\n(net: Use sk_tx_queue_mapping for connected sockets)\n\nReported-by: Denys Fedorysychenko \u003cnuclearcat@nuclearcat.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4eaa0e3c869acd5dbc7c2e3818a9ae9cbf221d27",
      "tree": "7583f360508bd0a01b666fb711d7d1c6e30e2ea9",
      "parents": [
        "0110d6f22f392f976e84ab49da1b42f85b64a3c5"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Wed Apr 14 16:13:29 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 14 16:13:29 2010 -0700"
      },
      "message": "fib: suppress lockdep-RCU false positive in FIB trie.\n\nFollowup of commit 634a4b20\n\nAllow tnode_get_child_rcu() to be called either under rcu_read_lock()\nprotection or with RTNL held.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: Paul E. McKenney \u003cpaulmck@linux.vnet.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "465de2ba71f5048341e0109f3f6c4d7dc65d9754",
      "tree": "59dbc051958e48859030f31f46b028808ab2681b",
      "parents": [
        "0d0fb0f9c5fddef4a10242fe3337f00f528a3099",
        "a6d37024de02e7cb2b2333e438e71355a9c32a0a"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 13 11:32:48 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 13 11:32:48 2010 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (25 commits)\n  smc91c92_cs: define multicast_table as unsigned char\n  can: avoids a false warning\n  e1000e: stop cleaning when we reach tx_ring-\u003enext_to_use\n  igb: restrict WoL for 82576 ET2 Quad Port Server Adapter\n  virtio_net: missing sg_init_table\n  Revert \"tcp: Set CHECKSUM_UNNECESSARY in tcp_init_nondata_skb\"\n  iwlwifi: need check for valid qos packet before free\n  tcp: Set CHECKSUM_UNNECESSARY in tcp_init_nondata_skb\n  udp: fix for unicast RX path optimization\n  myri10ge: fix rx_pause in myri10ge_set_pauseparam\n  net: corrected documentation for hardware time stamping\n  stmmac: use resource_size()\n  x.25 attempts to negotiate invalid throughput\n  x25: Patch to fix bug 15678 - x25 accesses fields beyond end of packet.\n  bridge: Fix IGMP3 report parsing\n  cnic: Fix crash during bnx2x MTU change.\n  qlcnic: fix set mac addr\n  r6040: fix r6040_multicast_list\n  vhost-net: fix vq_memory_access_ok error checking\n  ath9k: fix double calls to ath_radio_enable\n  ...\n"
    },
    {
      "commit": "4ffa87012efd7b664762b579213d4663560ef4a3",
      "tree": "37e255f778b1bda29341799b6aa209e62ce69f84",
      "parents": [
        "dac876193cd79ced36d0462749ea47c05844fb49"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Fri Apr 09 23:47:31 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 13 03:03:14 2010 -0700"
      },
      "message": "can: avoids a false warning\n\nAt this point optlen \u003d\u003d sizeof(sfilter) but some compilers are dumb.\n\nReported-by: Németh Márton \u003cnm127@freemail.h\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nAcked-by: Oliver Hartkopp \u003coliver@hartkopp.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fedfb947b2235c1085df97cf52f688b808c3a515",
      "tree": "5eb0ffcd0eace60c7e206df6f33f9841b452f2b3",
      "parents": [
        "44fa2b4bee5b07d506a7b002b4e2eb73654db7e0",
        "bade732a2848e640482c1e99629a90e085d574dd"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Apr 12 18:34:56 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Apr 12 18:34:56 2010 -0700"
      },
      "message": "Merge branch \u0027for-2.6.34\u0027 of git://linux-nfs.org/~bfields/linux\n\n* \u0027for-2.6.34\u0027 of git://linux-nfs.org/~bfields/linux:\n  svcrdma: RDMA support not yet compatible with RPC6\n"
    },
    {
      "commit": "4a1032faac94ebbf647460ae3e06fc21146eb280",
      "tree": "7f31b97beb0406faa1523e619289ad0ab07c9787",
      "parents": [
        "ae4e8d63b5619d4d95f1d2bfa2b836caa6e62d06",
        "0eddb519b9127c73d53db4bf3ec1d45b13f844d1"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Apr 11 02:44:30 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Apr 11 02:44:30 2010 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of /home/davem/src/GIT/linux-2.6/\n"
    },
    {
      "commit": "ae4e8d63b5619d4d95f1d2bfa2b836caa6e62d06",
      "tree": "03ddf879e73bbcded7b959e1196a9d6884925d31",
      "parents": [
        "e3237e3c60c1f4a790b4e521e406b3ffff74f9bc"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Apr 11 02:40:49 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Apr 11 02:40:49 2010 -0700"
      },
      "message": "Revert \"tcp: Set CHECKSUM_UNNECESSARY in tcp_init_nondata_skb\"\n\nThis reverts commit 2626419ad5be1a054d350786b684b41d23de1538.\n\nIt causes regressions for people with IGB cards.  Connection\nrequests don\u0027t complete etc.  The true cause of the issue is\nstill not known, but we should sort this out in net-next-2.6\nnot net-2.6\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2626419ad5be1a054d350786b684b41d23de1538",
      "tree": "0fb43a4a6f01c9a50e3509b4240c018459dee12d",
      "parents": [
        "1223c67c0938d2df309fde618bd82c87c8c1af04"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 08 11:32:30 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 08 11:32:30 2010 -0700"
      },
      "message": "tcp: Set CHECKSUM_UNNECESSARY in tcp_init_nondata_skb\n\nBack in commit 04a0551c87363f100b04d28d7a15a632b70e18e7\n(\"loopback: Drop obsolete ip_summed setting\") we stopped\nsetting CHECKSUM_UNNECESSARY in the loopback xmit.\n\nThis is because such a setting was a lie since it implies that the\nchecksum field of the packet is properly filled in.\n\nInstead what happens normally is that CHECKSUM_PARTIAL is set and\nskb-\u003ecsum is calculated as needed.\n\nBut this was only happening for TCP data packets (via the\nskb-\u003eip_summed assignment done in tcp_sendmsg()).  It doesn\u0027t\nhappen for non-data packets like ACKs etc.\n\nFix this by setting skb-\u003eip_summed in the common non-data packet\nconstructor.  It already is setting skb-\u003ecsum to zero.\n\nBut this reminds us that we still have things like ip_output.c\u0027s\nip_dev_loopback_xmit() which sets skb-\u003eip_summed to the value\nCHECKSUM_UNNECESSARY, which Herbert\u0027s patch teaches us is not\nvalid.  So we\u0027ll have to address that at some point too.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1223c67c0938d2df309fde618bd82c87c8c1af04",
      "tree": "12445eb8f4ab8acece9cd96e337ce49b29e3f31a",
      "parents": [
        "2488f56d3699b84ee51d2940d1347345b8f9b0e1"
      ],
      "author": {
        "name": "Jorge Boncompte [DTI2]",
        "email": "jorge@dti2.net",
        "time": "Thu Apr 08 04:56:48 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 08 11:29:13 2010 -0700"
      },
      "message": "udp: fix for unicast RX path optimization\n\nCommits 5051ebd275de672b807c28d93002c2fb0514a3c9 and\n5051ebd275de672b807c28d93002c2fb0514a3c9 (\"ipv[46]: udp: optimize unicast RX\npath\") broke some programs.\n\n\tAfter upgrading a L2TP server to 2.6.33 it started to fail, tunnels going up an\ndown, after the 10th tunnel came up. My modified rp-l2tp uses a global\nunconnected socket bound to (INADDR_ANY, 1701) and one connected socket per\ntunnel after parameter negotiation.\n\n\tAfter ten sockets were open and due to mixed parameters to\nudp[46]_lib_lookup2() kernel started to drop packets.\n\nSigned-off-by: Jorge Boncompte [DTI2] \u003cjorge@dti2.net\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ddd0451fc8dbf94446c81500ff0dcee06c4057cb",
      "tree": "89d5f4de47e506c8c7ddb25486fff0dd7362a287",
      "parents": [
        "f5eb917b861828da18dc28854308068c66d1449a"
      ],
      "author": {
        "name": "John Hughes",
        "email": "john@Calva.COM",
        "time": "Sun Apr 04 06:48:10 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 07 21:33:02 2010 -0700"
      },
      "message": "x.25 attempts to negotiate invalid throughput\n\nThe current X.25 code has some bugs in throughput negotiation:\n\n   1. It does negotiation in all cases, usually there is no need\n   2. It incorrectly attempts to negotiate the throughput class in one\n      direction only.  There are separate throughput classes for input\n      and output and if either is negotiated both mist be negotiates.\n\nThis is bug https://bugzilla.kernel.org/show_bug.cgi?id\u003d15681\n\nThis bug was first reported by Daniel Ferenci to the linux-x25 mailing\nlist on 6/8/2004, but is still present.\n\nThe current (2.6.34) x.25 code doesn\u0027t seem to know that the X.25\nthroughput facility includes two values, one for the required\nthroughput outbound, one for inbound.\n\nThis causes it to attempt to negotiate throughput 0x0A, which is\nthroughput 9600 inbound and the illegal value \"0\" for inbound\nthroughput.\n\nBecause of this some X.25 devices (e.g. Cisco 1600) refuse to connect\nto Linux X.25.\n\nThe following patch fixes this behaviour.  Unless the user specifies a\nrequired throughput it does not attempt to negotiate.  If the user\ndoes not specify a throughput it accepts the suggestion of the remote\nX.25 system.  If the user requests a throughput then it validates both\nthe input and output throughputs and correctly negotiates them with\nthe remote end.\n\nSigned-off-by: John Hughes \u003cjohn@calva.com\u003e\nTested-by: Andrew Hendry \u003candrew.hendry@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f5eb917b861828da18dc28854308068c66d1449a",
      "tree": "aa45d1a809abbe426b55dc89b8167e5a6609d418",
      "parents": [
        "fd218cf9557b9bf7061365a8fe7020a56d3f767c"
      ],
      "author": {
        "name": "John Hughes",
        "email": "john@calva.com",
        "time": "Wed Apr 07 21:29:25 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 07 21:29:25 2010 -0700"
      },
      "message": "x25: Patch to fix bug 15678 - x25 accesses fields beyond end of packet.\n\nHere is a patch to stop X.25 examining fields beyond the end of the packet.\n\nFor example, when a simple CALL ACCEPTED was received:\n\n\t10 10 0f\n\nx25_parse_facilities was attempting to decode the FACILITIES field, but this\npacket contains no facilities field.\n\nSigned-off-by: John Hughes \u003cjohn@calva.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fd218cf9557b9bf7061365a8fe7020a56d3f767c",
      "tree": "f96f035cb73060da366a9fdfdb10915cd7ce7089",
      "parents": [
        "94824f3dbe0d3f62470603bbb18efb5510aaf07c"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Apr 07 21:20:47 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 07 21:20:47 2010 -0700"
      },
      "message": "bridge: Fix IGMP3 report parsing\n\nThe IGMP3 report parsing is looking at the wrong address for\ngroup records.  This patch fixes it.\n\nReported-by: Banyeer \u003cbanyeer@yahoo.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "005c93b5d876edf670b4c71d8dd79dc4e845a099",
      "tree": "5ee50d6174e3ed9f4fec8fec9ca53e780b874a23",
      "parents": [
        "fb9e2d887243499b8d28efcf80821c4f6a092395",
        "1144601118507f8b3b676a9a392584d216d3f2cc"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 07 16:41:03 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 07 16:41:03 2010 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "0379185b6c0d1e8252023698cf1091da92a3dc03",
      "tree": "f4dfe150ef44b2b94d94c982f8bddf9c44c4294d",
      "parents": [
        "1cb561f83793191cf86a2db3948d28f5f42df9ff"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Tue Apr 06 11:18:42 2010 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Apr 06 15:53:30 2010 -0400"
      },
      "message": "mac80211: annotate station rcu dereferences\n\nThe new RCU lockdep support warns about these\nin some contexts -- make it aware of the locks\nused to protect all this. Different locks are\nused in different contexts which unfortunately\nmeans we can\u0027t get perfect checking.\n\nAlso remove rcu_dereference() from two places\nthat don\u0027t actually dereference the pointers.\n\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "1cb561f83793191cf86a2db3948d28f5f42df9ff",
      "tree": "f1d8109a0ed6595e1fb6ef3e5b14b8194deb5215",
      "parents": [
        "de0f60ea94e132c858caa64a44b2012e1e8580b0"
      ],
      "author": {
        "name": "Javier Cardona",
        "email": "javier@cozybit.com",
        "time": "Mon Mar 29 11:00:20 2010 -0700"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Apr 06 15:53:28 2010 -0400"
      },
      "message": "mac80211: Handle mesh action frames in ieee80211_rx_h_action\n\nThis fixes the problem introduced in commit\n8404080568613d93ad7cf0a16dfb68 which broke mesh peer link establishment.\n\nchanges:\nv2 \tAdded missing break (Johannes)\nv3 \tBroke original patch into two (Johannes)\n\nSigned-off-by: Javier Cardona \u003cjavier@cozybit.com\u003e\nCc: stable@kernel.org\nReviewed-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "cb4361c1dc29cd870f664c004b1817106fbce0fa",
      "tree": "c31533210d738c9074b21b8f31fe0399b39545f0",
      "parents": [
        "309361e09ca9e9670dc8664e5d14125bf82078af",
        "fb9e2d887243499b8d28efcf80821c4f6a092395"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 06 08:34:06 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 06 08:34:06 2010 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (37 commits)\n  smc91c92_cs: fix the problem of \"Unable to find hardware address\"\n  r8169: clean up my printk uglyness\n  net: Hook up cxgb4 to Kconfig and Makefile\n  cxgb4: Add main driver file and driver Makefile\n  cxgb4: Add remaining driver headers and L2T management\n  cxgb4: Add packet queues and packet DMA code\n  cxgb4: Add HW and FW support code\n  cxgb4: Add register, message, and FW definitions\n  netlabel: Fix several rcu_dereference() calls used without RCU read locks\n  bonding: fix potential deadlock in bond_uninit()\n  net: check the length of the socket address passed to connect(2)\n  stmmac: add documentation for the driver.\n  stmmac: fix kconfig for crc32 build error\n  be2net: fix bug in vlan rx path for big endian architecture\n  be2net: fix flashing on big endian architectures\n  be2net: fix a bug in flashing the redboot section\n  bonding: bond_xmit_roundrobin() fix\n  drivers/net: Add missing unlock\n  net: gianfar - align BD ring size console messages\n  net: gianfar - initialize per-queue statistics\n  ...\n"
    },
    {
      "commit": "749d229761ff0135cc4e16b8a28b41ae2f6b2c35",
      "tree": "25551c8cfb38319211f5ee59e78462a0f6fb85c4",
      "parents": [
        "795d580baec0d5386b83a8b557df47c20810e86b",
        "3dc9fef67f6292692dba181a6d0fd0211bd0a607"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Apr 05 13:42:54 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Apr 05 13:42:54 2010 -0700"
      },
      "message": "Merge branch \u0027for-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/ericvh/v9fs\n\n* \u0027for-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/ericvh/v9fs:\n  9p: saving negative to unsigned char\n  9p: return on mutex_lock_interruptible()\n  9p: Creating files with names too long should fail with ENAMETOOLONG.\n  9p: Make sure we are able to clunk the cached fid on umount\n  9p: drop nlink remove\n  fs/9p: Clunk the fid resulting from partial walk of the name\n  9p: documentation update\n  9p: Fix setting of protocol flags in v9fs_session_info structure.\n"
    },
    {
      "commit": "3dc9fef67f6292692dba181a6d0fd0211bd0a607",
      "tree": "643e6ecbcf8ffe58bdbd19ce2acde43643eeaf2b",
      "parents": [
        "85a770a8889035625466a4cfb1393cd7d2ffd165"
      ],
      "author": {
        "name": "Dan Carpenter",
        "email": "error27@gmail.com",
        "time": "Mon Apr 05 14:37:28 2010 -0500"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Mon Apr 05 14:37:28 2010 -0500"
      },
      "message": "9p: saving negative to unsigned char\n\nSaving -EINVAL as unsigned char truncates the high bits and changes it\ninto 234 instead of -22.  This breaks the test for \"if (ret \u003d\u003d -EINVAL)\"\nin parse_opts().\n\nSigned-off-by: Dan Carpenter \u003cerror27@gmail.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "bade732a2848e640482c1e99629a90e085d574dd",
      "tree": "721ae2ac175ccbc15af2abb4fc288f352a453c73",
      "parents": [
        "2eaa9cfdf33b8d7fb7aff27792192e0019ae8fc6"
      ],
      "author": {
        "name": "Tom Tucker",
        "email": "tom@ogc.us",
        "time": "Sat Apr 03 08:27:29 2010 -0500"
      },
      "committer": {
        "name": "J. Bruce Fields",
        "email": "bfields@citi.umich.edu",
        "time": "Mon Apr 05 12:10:22 2010 -0400"
      },
      "message": "svcrdma: RDMA support not yet compatible with RPC6\n\nRPC6 requires that it be possible to create endpoints that listen\nexclusively for IPv4 or IPv6 connection requests. This is not currently\nsupported by the RDMA API.\n\nThis fixes a server RDMA regression introduced by 37498292a \"NFSD:\nCreate PF_INET6 listener in write_ports\".\n\nSigned-off-by: Tom Tucker\u003ctom@opengridcomputing.com\u003e\nTested-by: Steve Wise \u003cswise@opengridcomputing.com\u003e\nReviewed-by: Chuck Lever \u003cchuck.lever@oracle.com\u003e\nSigned-off-by: J. Bruce Fields \u003cbfields@citi.umich.edu\u003e\n"
    },
    {
      "commit": "6d96d3ab7aea5f0e75205a0c97f8d1fdf82c5287",
      "tree": "a4dfa0472e2e670de1da7e7c0905da12d4608ab4",
      "parents": [
        "d994f4058d9f9be7e44529b55fc6be6552901ead"
      ],
      "author": {
        "name": "Aneesh Kumar K.V",
        "email": "aneesh.kumar@linux.vnet.ibm.com",
        "time": "Mon Mar 29 18:13:59 2010 -0500"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Mon Apr 05 10:37:36 2010 -0500"
      },
      "message": "9p: Make sure we are able to clunk the cached fid on umount\n\ndcache prune happen on umount. So we cannot mark the client\nsatus disconnect. That will prevent a 9p call to the server\n\nSigned-off-by: Aneesh Kumar K.V \u003caneesh.kumar@linux.vnet.ibm.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n\n\n"
    },
    {
      "commit": "b914f3a2a35812545f773645f340d7c075e5b64d",
      "tree": "813a4aeedd6594700a35f2fbf18754dae96edd55",
      "parents": [
        "9e2e61fbf8ad016d24e4af0afff13505f3dd2a2a"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Thu Apr 01 10:43:57 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 01 18:32:08 2010 -0700"
      },
      "message": "netlabel: Fix several rcu_dereference() calls used without RCU read locks\n\nThe recent changes to add RCU lock verification to rcu_dereference() calls\ncaught out a problem with netlbl_unlhsh_hash(), see below.\n\n \u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n [ INFO: suspicious rcu_dereference_check() usage. ]\n ---------------------------------------------------\n net/netlabel/netlabel_unlabeled.c:246 invoked rcu_dereference_check()\n without protection!\n\nThis patch fixes this problem as well as others like it in the NetLabel\ncode.  Also included in this patch is the identification of future work\nto eliminate the RCU read lock in netlbl_domhsh_add(), but in the interest\nof getting this patch out quickly that work will happen in another patch\nto be finished later.\n\nThanks to Eric Dumazet and Paul McKenney for their help in understanding\nthe recent RCU changes.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nReported-by: David Howells \u003cdhowells@redhat.com\u003e\nCC: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nCC: Paul E. McKenney \u003cpaulmck@linux.vnet.ibm.com\u003e\nAcked-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6503d96168f891ffa3b70ae6c9698a1a722025a0",
      "tree": "9fafcd9eb2c0b3feda0cf4c36e4167ba3028d83a",
      "parents": [
        "a1d6f3f65512cc90a636e6ec653b7bc9e2238753"
      ],
      "author": {
        "name": "Changli Gao",
        "email": "xiaosuo@gmail.com",
        "time": "Wed Mar 31 22:58:26 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 01 17:26:01 2010 -0700"
      },
      "message": "net: check the length of the socket address passed to connect(2)\n\ncheck the length of the socket address passed to connect(2).\n\nCheck the length of the socket address passed to connect(2). If the\nlength is invalid, -EINVAL will be returned.\n\nSigned-off-by: Changli Gao \u003cxiaosuo@gmail.com\u003e\n----\nnet/bluetooth/l2cap.c | 3 ++-\nnet/bluetooth/rfcomm/sock.c | 3 ++-\nnet/bluetooth/sco.c | 3 ++-\nnet/can/bcm.c | 3 +++\nnet/ieee802154/af_ieee802154.c | 3 +++\nnet/ipv4/af_inet.c | 5 +++++\nnet/netlink/af_netlink.c | 3 +++\n7 files changed, 20 insertions(+), 3 deletions(-)\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d5dc056cce9e60528d5eac64efed623d26ffe46f",
      "tree": "b5124013d0935be211fd1df702db2f69c581c5ab",
      "parents": [
        "00ae702847df5566ce9182e9c895185e2ad1c181",
        "7371400431389e1df6a2a05ab9882055b8a6ff2c"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 31 19:32:50 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 31 19:32:50 2010 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "baff42ab1494528907bf4d5870359e31711746ae",
      "tree": "82cfffb254ea1f5b95701d328375228f7ab343e6",
      "parents": [
        "c0cd884af045338476b8e69a61fceb3f34ff22f1"
      ],
      "author": {
        "name": "Steven J. Magnani",
        "email": "steve@digidescorp.com",
        "time": "Tue Mar 30 13:56:01 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Mar 30 13:56:01 2010 -0700"
      },
      "message": "net: Fix oops from tcp_collapse() when using splice()\n\ntcp_read_sock() can have a eat skbs without immediately advancing copied_seq.\nThis can cause a panic in tcp_collapse() if it is called as a result\nof the recv_actor dropping the socket lock.\n\nA userspace program that splices data from a socket to either another\nsocket or to a file can trigger this bug.\n\nSigned-off-by: Steven J. Magnani \u003csteve@digidescorp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7236fe29fd72d17074574ba312e7f1bb9d10abaa",
      "tree": "6afd1fed2871daca52f5a8b3070337ae1b6ada0d",
      "parents": [
        "05a9a1617026977422c7c5ed3aeac6f46fa2132c"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes.berg@intel.com",
        "time": "Mon Mar 22 13:42:43 2010 -0700"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Mar 30 15:37:28 2010 -0400"
      },
      "message": "mac80211: move netdev queue enabling to correct spot\n\n\"mac80211: fix skb buffering issue\" still left a race\nbetween enabling the hardware queues and the virtual\ninterface queues. In hindsight it\u0027s totally obvious\nthat enabling the netdev queues for a hardware queue\nwhen the hardware queue is enabled is wrong, because\nit could well possible that we can fill the hw queue\nwith packets we already have pending. Thus, we must\nonly enable the netdev queues once all the pending\npackets have been processed and sent off to the device.\n\nIn testing, I haven\u0027t been able to trigger this race\ncondition, but it\u0027s clearly there, possibly only when\naggregation is being enabled.\n\nSigned-off-by: Johannes Berg \u003cjohannes.berg@intel.com\u003e\nCc: stable@kernel.org\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "533866b12cce484994163b1e201778cbac4c04c5",
      "tree": "6623b75a54f72e53da78fc2982b8486d62346aae",
      "parents": [
        "c7a00dc73b7185ab2ebd1aa7ce710c7b4edc77a4"
      ],
      "author": {
        "name": "Porsch, Marco",
        "email": "marco.porsch@siemens.com",
        "time": "Wed Feb 24 09:53:13 2010 +0100"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Mar 30 15:37:23 2010 -0400"
      },
      "message": "mac80211: fix PREQ processing and one small bug\n\n1st) a PREQ should only be processed, if it has the same SN and better\nmetric (instead of better or equal).\n2nd) next_hop[ETH_ALEN] now actually used to buffer\nmpath-\u003enext_hop-\u003esta.addr for use out of lock.\n\nSigned-off-by: Marco Porsch \u003cmarco.porsch@siemens.com\u003e\nAcked-by: Javier Cardona \u003cjavier@cozybit.com\u003e\nCc: stable@kernel.org\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "c7a00dc73b7185ab2ebd1aa7ce710c7b4edc77a4",
      "tree": "9eadd919277988355b44c2a63e9d027fe81cfd2a",
      "parents": [
        "368d06f5b0eefcbf37d677d3b65381310a251f03"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Mar 17 11:28:18 2010 -0400"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Mar 30 15:37:22 2010 -0400"
      },
      "message": "mac80211: correct typos in \"unavailable upon resume\" warning\n\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "368d06f5b0eefcbf37d677d3b65381310a251f03",
      "tree": "e8e05e1e6a34583f31203c29c03dcf9f6c036aeb",
      "parents": [
        "c8406ea8fa1adde8dc5400127281d497bbcdb84a"
      ],
      "author": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Mar 16 15:40:59 2010 -0400"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue Mar 30 15:37:20 2010 -0400"
      },
      "message": "wireless: convert reg_regdb_search_lock to mutex\n\nStanse discovered that kmalloc is being called with GFP_KERNEL while\nholding this spinlock.  The spinlock can be a mutex instead, which also\nenables the removal of the unlock/lock around the lock/unlock of\ncfg80211_mutex and the call to set_regdom.\n\nReported-by: Jiri Slaby \u003cjirislaby@gmail.com\u003e\nCc: stable@kernel.org\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "5a0e3ad6af8660be21ca98a971cd00f331318c05",
      "tree": "5bfb7be11a03176a87296a43ac6647975c00a1d1",
      "parents": [
        "ed391f4ebf8f701d3566423ce8f17e614cde9806"
      ],
      "author": {
        "name": "Tejun Heo",
        "email": "tj@kernel.org",
        "time": "Wed Mar 24 17:04:11 2010 +0900"
      },
      "committer": {
        "name": "Tejun Heo",
        "email": "tj@kernel.org",
        "time": "Tue Mar 30 22:02:32 2010 +0900"
      },
      "message": "include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h\n\npercpu.h is included by sched.h and module.h and thus ends up being\nincluded when building most .c files.  percpu.h includes slab.h which\nin turn includes gfp.h making everything defined by the two files\nuniversally available and complicating inclusion dependencies.\n\npercpu.h -\u003e slab.h dependency is about to be removed.  Prepare for\nthis change by updating users of gfp and slab facilities include those\nheaders directly instead of assuming availability.  As this conversion\nneeds to touch large number of source files, the following script is\nused as the basis of conversion.\n\n  http://userweb.kernel.org/~tj/misc/slabh-sweep.py\n\nThe script does the followings.\n\n* Scan files for gfp and slab usages and update includes such that\n  only the necessary includes are there.  ie. if only gfp is used,\n  gfp.h, if slab is used, slab.h.\n\n* When the script inserts a new include, it looks at the include\n  blocks and try to put the new include such that its order conforms\n  to its surrounding.  It\u0027s put in the include block which contains\n  core kernel includes, in the same order that the rest are ordered -\n  alphabetical, Christmas tree, rev-Xmas-tree or at the end if there\n  doesn\u0027t seem to be any matching order.\n\n* If the script can\u0027t find a place to put a new include (mostly\n  because the file doesn\u0027t have fitting include block), it prints out\n  an error message indicating which .h file needs to be added to the\n  file.\n\nThe conversion was done in the following steps.\n\n1. The initial automatic conversion of all .c files updated slightly\n   over 4000 files, deleting around 700 includes and adding ~480 gfp.h\n   and ~3000 slab.h inclusions.  The script emitted errors for ~400\n   files.\n\n2. Each error was manually checked.  Some didn\u0027t need the inclusion,\n   some needed manual addition while adding it to implementation .h or\n   embedding .c file was more appropriate for others.  This step added\n   inclusions to around 150 files.\n\n3. The script was run again and the output was compared to the edits\n   from #2 to make sure no file was left behind.\n\n4. Several build tests were done and a couple of problems were fixed.\n   e.g. lib/decompress_*.c used malloc/free() wrappers around slab\n   APIs requiring slab.h to be added manually.\n\n5. The script was run on all .h files but without automatically\n   editing them as sprinkling gfp.h and slab.h inclusions around .h\n   files could easily lead to inclusion dependency hell.  Most gfp.h\n   inclusion directives were ignored as stuff from gfp.h was usually\n   wildly available and often used in preprocessor macros.  Each\n   slab.h inclusion directive was examined and added manually as\n   necessary.\n\n6. percpu.h was updated not to include slab.h.\n\n7. Build test were done on the following configurations and failures\n   were fixed.  CONFIG_GCOV_KERNEL was turned off for all tests (as my\n   distributed build env didn\u0027t work with gcov compiles) and a few\n   more options had to be turned off depending on archs to make things\n   build (like ipr on powerpc/64 which failed due to missing writeq).\n\n   * x86 and x86_64 UP and SMP allmodconfig and a custom test config.\n   * powerpc and powerpc64 SMP allmodconfig\n   * sparc and sparc64 SMP allmodconfig\n   * ia64 SMP allmodconfig\n   * s390 SMP allmodconfig\n   * alpha SMP allmodconfig\n   * um on x86_64 SMP allmodconfig\n\n8. percpu.h modifications were reverted so that it could be applied as\n   a separate patch and serve as bisection point.\n\nGiven the fact that I had only a couple of failures from tests on step\n6, I\u0027m fairly confident about the coverage of this conversion patch.\nIf there is a breakage, it\u0027s likely to be something in one of the arch\nheaders which should be easily discoverable easily on most builds of\nthe specific arch.\n\nSigned-off-by: Tejun Heo \u003ctj@kernel.org\u003e\nGuess-its-ok-by: Christoph Lameter \u003ccl@linux-foundation.org\u003e\nCc: Ingo Molnar \u003cmingo@redhat.com\u003e\nCc: Lee Schermerhorn \u003cLee.Schermerhorn@hp.com\u003e\n"
    },
    {
      "commit": "788e69e548cc8d127b90f0de1f7b7e983d1d587a",
      "tree": "b8312151a877978d579af189789e1f3f477f3a5f",
      "parents": [
        "a5990ea1254cd186b38744507aeec3136a0c1c95"
      ],
      "author": {
        "name": "J. Bruce Fields",
        "email": "bfields@citi.umich.edu",
        "time": "Mon Mar 29 21:02:31 2010 -0400"
      },
      "committer": {
        "name": "J. Bruce Fields",
        "email": "bfields@citi.umich.edu",
        "time": "Mon Mar 29 21:02:31 2010 -0400"
      },
      "message": "svcrpc: don\u0027t hold sv_lock over svc_xprt_put()\n\nsvc_xprt_put() can call tcp_close(), which can sleep, so we shouldn\u0027t be\nholding this lock.\n\nIn fact, only the xpt_list removal and the sv_tmpcnt decrement should\nneed the sv_lock here.\n\nReported-by: Mi Jinlong \u003cmijinlong@cn.fujitsu.com\u003e\nSigned-off-by: J. Bruce Fields \u003cbfields@citi.umich.edu\u003e\n"
    },
    {
      "commit": "6631424fd2efd75e7394b318ad2a8597327857a9",
      "tree": "09cc31036c9c53c5faec578ad68d443fd53e1b3d",
      "parents": [
        "c45140a996b511bccdcbbdbea7e36f001826bdf2",
        "c0cd884af045338476b8e69a61fceb3f34ff22f1"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Mar 29 14:41:18 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Mar 29 14:41:18 2010 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (33 commits)\n  r8169: offical fix for CVE-2009-4537 (overlength frame DMAs)\n  ipv6: Don\u0027t drop cache route entry unless timer actually expired.\n  tulip: Add missing parens.\n  r8169: fix broken register writes\n  pcnet_cs: add new id\n  bonding: fix broken multicast with round-robin mode\n  drivers/net: Fix continuation lines\n  e1000: do not modify tx_queue_len on link speed change\n  net: ipmr/ip6mr: prevent out-of-bounds vif_table access\n  ixgbe: Do not run all Diagnostic offline tests when VFs are active\n  igb: use correct bits to identify if managability is enabled\n  benet: Fix compile warnnings in drivers/net/benet/be_ethtool.c\n  net: Add MSG_WAITFORONE flag to recvmmsg\n  e1000e: do not modify tx_queue_len on link speed change\n  igbvf: do not modify tx_queue_len on link speed change\n  ipv4: Restart rt_intern_hash after emergency rebuild (v2)\n  ipv4: Cleanup struct net dereference in rt_intern_hash\n  net: fix netlink address dumping in IPv4/IPv6\n  tulip: Fix null dereference in uli526x_rx_packet()\n  gianfar: fix undo of reserve()\n  ...\n"
    },
    {
      "commit": "54c1a859efd9fd6cda05bc700315ba2519c14eba",
      "tree": "c649e270baaa39f1dadbc0f2bc27842ea618dbb6",
      "parents": [
        "7855f761998893bb6bf861d55df95036fc9e36ab"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki / 吉藤英明",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Sun Mar 28 07:15:45 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 28 19:34:26 2010 -0700"
      },
      "message": "ipv6: Don\u0027t drop cache route entry unless timer actually expired.\n\nThis is ipv6 variant of the commit 5e016cbf6.. (\"ipv4: Don\u0027t drop\nredirected route cache entry unless PTMU actually expired\")\nby Guenter Roeck \u003cguenter.roeck@ericsson.com\u003e.\n\nRemove cache route entry in ipv6_negative_advice() only if\nthe timer is expired.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7438189baa0a2fe30084bdc97e3d540ebc5444f3",
      "tree": "6627b63b785df9175e04a0ce1b49d5eea8ea0777",
      "parents": [
        "e7d481a6f3c13041446b7bb8f98ab861460076a3"
      ],
      "author": {
        "name": "Nicolas Dichtel",
        "email": "nicolas.dichtel@dev.6wind.com",
        "time": "Thu Mar 25 23:45:35 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Mar 27 08:33:21 2010 -0700"
      },
      "message": "net: ipmr/ip6mr: prevent out-of-bounds vif_table access\n\nWhen cache is unresolved, c-\u003emf[6]c_parent is set to 65535 and\nminvif, maxvif are not initialized, hence we must avoid to\nparse IIF and OIF.\nA second problem can happen when the user dumps a cache entry\nwhere a VIF, that was referenced at creation time, has been\nremoved.\n\nSigned-off-by: Nicolas Dichtel \u003cnicolas.dichtel@6wind.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "71c5c1595c04852d6fbf3c4882b47b30b61a4d32",
      "tree": "d95c64c5b752d37e7d1235e52f0c1fceb816c2ec",
      "parents": [
        "f49c57e141c7f53353e4265a31dc2324e6215037"
      ],
      "author": {
        "name": "Brandon L Black",
        "email": "blblack@gmail.com",
        "time": "Fri Mar 26 16:18:03 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Mar 27 08:29:01 2010 -0700"
      },
      "message": "net: Add MSG_WAITFORONE flag to recvmmsg\n\nAdd new flag MSG_WAITFORONE for the recvmmsg() syscall.\nWhen this flag is specified for a blocking socket, recvmmsg()\nwill only block until at least 1 packet is available.  The\ndefault behavior is to block until all vlen packets are\navailable.  This flag has no effect on non-blocking sockets\nor when used in combination with MSG_DONTWAIT.\n\nSigned-off-by: Brandon L Black \u003cblblack@gmail.com\u003e\nAcked-by: Ulrich Drepper \u003cdrepper@redhat.com\u003e\nAcked-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nAcked-by: Arnaldo Carvalho de Melo \u003cacme@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6a2bad70d546cf30a46bc6d9ec0cb9a0891a38eb",
      "tree": "890e8db3cb7c5c8636b10e817b8cdbc5c90e265e",
      "parents": [
        "b35ecb5d404c00f2420221ccbb1bbba1139353a4"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Wed Mar 24 21:51:22 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Mar 26 20:57:35 2010 -0700"
      },
      "message": "ipv4: Restart rt_intern_hash after emergency rebuild (v2)\n\nThe the rebuild changes the genid which in turn is used at\nthe hash calculation. Thus if we don\u0027t restart and go on with\ninserting the rt will happen in wrong chain.\n\n(Fixed Neil\u0027s comment about the index passed into the rt_intern_hash)\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nReviewed-by: Neil Horman \u003cnhorman@tuxdriver.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b35ecb5d404c00f2420221ccbb1bbba1139353a4",
      "tree": "f5b1ebf5baae4d37e5ee84932e59a2668724e2b2",
      "parents": [
        "4b97efdf392563bf03b4917a0b5add2df65de39a"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Wed Mar 24 07:43:17 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Mar 26 20:57:35 2010 -0700"
      },
      "message": "ipv4: Cleanup struct net dereference in rt_intern_hash\n\nThere\u0027s no need in getting it 3 times and gcc isn\u0027t smart enough\nto understand this himself.\n\nThis is just a cleanup before the fix (next patch).\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4b97efdf392563bf03b4917a0b5add2df65de39a",
      "tree": "4add83ac917bb6d8319fc48c64529fd607721151",
      "parents": [
        "ac90a149361a331f697d5aa500bedcff22054669"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Fri Mar 26 20:27:49 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Mar 26 20:27:49 2010 -0700"
      },
      "message": "net: fix netlink address dumping in IPv4/IPv6\n\nWhen a dump is interrupted at the last device in a hash chain and\nthen continued, \"idx\" won\u0027t get incremented past s_idx, so s_ip_idx\nis not reset when moving on to the next device. This means of all\nfollowing devices only the last n - s_ip_idx addresses are dumped.\n\nTested-by: Pawel Staszewski \u003cpstaszewski@itcare.pl\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "126a031e437a4ab56a162e9cff7fc04b9f7efeec",
      "tree": "8fdf2ffd565a0808827665ce74fe65e35647296b",
      "parents": [
        "01e77706cdde7c0b47e5ca1f4284a795504c7c40",
        "7c9f757319ccf7a47ce167b86eda671c87b5b917"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Mar 25 14:06:29 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Mar 25 14:06:29 2010 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (25 commits)\n  TIPC: Removed inactive maintainer\n  isdn: Cleanup Sections in PCMCIA driver elsa\n  isdn: Cleanup Sections in PCMCIA driver avma1\n  isdn: Cleanup Sections in PCMCIA driver teles\n  isdn: Cleanup Sections in PCMCIA driver sedlbauer\n  via-velocity: Fix FLOW_CNTL_TX_RX handling in set_mii_flow_control()\n  netfilter: xt_hashlimit: IPV6 bugfix\n  netfilter: ip6table_raw: fix table priority\n  netfilter: xt_hashlimit: dl_seq_stop() fix\n  af_key: return error if pfkey_xfrm_policy2msg_prep() fails\n  skbuff: remove unused dma_head \u0026 dma_maps fields\n  vlan: updates vlan real_num_tx_queues\n  vlan: adds vlan_dev_select_queue\n  igb: only use vlan_gro_receive if vlans are registered\n  igb: do not modify tx_queue_len on link speed change\n  igb: count Rx FIFO errors correctly\n  bnx2: Use proper handler during netpoll.\n  bnx2: Fix netpoll crash.\n  ksz884x: fix return value of netdev_set_eeprom\n  cgroups: net_cls as module\n  ...\n"
    },
    {
      "commit": "80bb3a00fa314e3c5dbbd23a38bfaf94f2402b99",
      "tree": "ef2e5b4dde5ef7674b5cc713db9dc925d1f98f15",
      "parents": [
        "9a127aad4d60968fba96622008ea0d243688f2b0",
        "8f5992291457c8e6de2f5fe39849de6756be1a96"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 25 11:48:58 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 25 11:48:58 2010 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6\n"
    },
    {
      "commit": "8f5992291457c8e6de2f5fe39849de6756be1a96",
      "tree": "ed70a062c6f154e0faa23986c3115bdf508d3e7b",
      "parents": [
        "9c13886665c43600bd0af4b38e33c654e648e078"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Mar 25 17:25:11 2010 +0100"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Thu Mar 25 17:25:11 2010 +0100"
      },
      "message": "netfilter: xt_hashlimit: IPV6 bugfix\n\nA missing break statement in hashlimit_ipv6_mask(), and masks\nbetween /64 and /95 are not working at all...\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "9c13886665c43600bd0af4b38e33c654e648e078",
      "tree": "edbcf36e1861c0c65ef0d1f0c0c1324da79d2f53",
      "parents": [
        "55e0d7cf279177dfe320f54816320558bc370f24"
      ],
      "author": {
        "name": "Jozsef Kadlecsik",
        "email": "kadlec@blackhole.kfki.hu",
        "time": "Thu Mar 25 11:17:26 2010 +0100"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Thu Mar 25 11:17:26 2010 +0100"
      },
      "message": "netfilter: ip6table_raw: fix table priority\n\nThe order of the IPv6 raw table is currently reversed, that makes impossible\nto use the NOTRACK target in IPv6: for example if someone enters\n\nip6tables -t raw -A PREROUTING -p tcp --dport 80 -j NOTRACK\n\nand if we receive fragmented packets then the first fragment will be\nuntracked and thus skip nf_ct_frag6_gather (and conntrack), while all\nsubsequent fragments enter nf_ct_frag6_gather and reassembly will never\nsuccessfully be finished.\n\nSinged-off-by: Jozsef Kadlecsik \u003ckadlec@blackhole.kfki.hu\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "55e0d7cf279177dfe320f54816320558bc370f24",
      "tree": "6f8c896e95c4a315409fb8053f2ca075b8b72962",
      "parents": [
        "ef1691504c83ba3eb636c0cfd3ed33f7a6d0b4ee"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Mar 25 11:00:22 2010 +0100"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Thu Mar 25 11:00:22 2010 +0100"
      },
      "message": "netfilter: xt_hashlimit: dl_seq_stop() fix\n\nIf dl_seq_start() memory allocation fails, we crash later in\ndl_seq_stop(), trying to kfree(ERR_PTR(-ENOMEM))\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "6c75969e22ffe27df64ff7477bd35fe72bface3e",
      "tree": "d5bcf7f6b7963e3c8848640bcd0fc6b850252fa8",
      "parents": [
        "c02c873c25209f971c2e10884f50d4ab61db1e23",
        "556ae3bb32cabe483375b857dda1322384c57b65"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Mar 24 16:50:46 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Mar 24 16:50:46 2010 -0700"
      },
      "message": "Merge branch \u0027bugfixes\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6\n\n* \u0027bugfixes\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6:\n  NFS: don\u0027t try to decode GETATTR if DELEGRETURN returned error\n  sunrpc: handle allocation errors from __rpc_lookup_create()\n  SUNRPC: Fix the return value of rpc_run_bc_task()\n  SUNRPC: Fix a use after free bug with the NFSv4.1 backchannel\n  SUNRPC: Fix a potential memory leak in auth_gss\n  NFS: Prevent another deadlock in nfs_release_page()\n"
    },
    {
      "commit": "9a127aad4d60968fba96622008ea0d243688f2b0",
      "tree": "ab6df3df50405736b7f51b941da6c4d0b368a847",
      "parents": [
        "03e6d819c2cb2cc8ce5642669a0a7c72336ee7a2"
      ],
      "author": {
        "name": "Dan Carpenter",
        "email": "error27@gmail.com",
        "time": "Wed Mar 24 01:47:00 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 24 13:28:27 2010 -0700"
      },
      "message": "af_key: return error if pfkey_xfrm_policy2msg_prep() fails\n\nThe original code saved the error value but just returned 0 in the end.\n\nSigned-off-by: Dan Carpenter \u003cerror27@gmail.com\u003e\nAcked-by: Jamal Hadi Salim \u003chadi@mojatatu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f6b9f4b263f3178fc0f23f0e67d04386528cc727",
      "tree": "6f749e6baeaf910ff53a9dfa0075dfbd5c856ddd",
      "parents": [
        "669d3e0babb40018dd6e78f4093c13a2eac73866"
      ],
      "author": {
        "name": "Vasu Dev",
        "email": "vasu.dev@intel.com",
        "time": "Tue Mar 23 14:42:05 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 24 11:11:38 2010 -0700"
      },
      "message": "vlan: updates vlan real_num_tx_queues\n\nUpdates real_num_tx_queues in case underlying real device\nhas changed real_num_tx_queues.\n\n-v2\n As per Eric Dumazet\u003ceric.dumazet@gmail.com\u003e comment:-\n   -- adds BUG_ON to catch case of real_num_tx_queues exceeding num_tx_queues.\n   -- created this self contained patch to just update real_num_tx_queues.\n\nSigned-off-by: Vasu Dev \u003cvasu.dev@intel.com\u003e\nSigned-off-by: Jeff Kirsher \u003cjeffrey.t.kirsher@intel.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "669d3e0babb40018dd6e78f4093c13a2eac73866",
      "tree": "b463681d16ac806ddc889b02623361c64047d281",
      "parents": [
        "31b24b955c3ebbb6f3008a6374e61cf7c05a193c"
      ],
      "author": {
        "name": "Vasu Dev",
        "email": "vasu.dev@intel.com",
        "time": "Tue Mar 23 14:41:45 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 24 11:11:38 2010 -0700"
      },
      "message": "vlan: adds vlan_dev_select_queue\n\nThis is required to correctly select vlan tx queue for a driver\nsupporting multi tx queue with ndo_select_queue implemented since\ncurrently selected vlan tx queue is unaligned to selected queue by\nreal net_devce ndo_select_queue.\n\nUnaligned vlan tx queue selection causes thrash with higher vlan\ntx lock contention for least fcoe traffic and wrong socket tx\nqueue_mapping for ixgbe having ndo_select_queue implemented.\n\n-v2\n\nAs per Eric Dumazet\u003ceric.dumazet@gmail.com\u003e comments, mirrored\nvlan net_device_ops to have them with and without vlan_dev_select_queue\nand then select according to real dev ndo_select_queue present or not\nfor a vlan net_device. This is to completely skip vlan_dev_select_queue\ncalling for real net_device not supporting ndo_select_queue.\n\nSigned-off-by: Vasu Dev \u003cvasu.dev@intel.com\u003e\nSigned-off-by: Jeff Kirsher \u003cjeffrey.t.kirsher@intel.com\u003e\nAcked-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a5990ea1254cd186b38744507aeec3136a0c1c95",
      "tree": "d194df4b090b30d28075ac02f39a3dbc10628a2f",
      "parents": [
        "91885258e8343bb65c08f668d7e6c16563eb4284"
      ],
      "author": {
        "name": "Li Zefan",
        "email": "lizf@cn.fujitsu.com",
        "time": "Thu Mar 11 14:08:10 2010 -0800"
      },
      "committer": {
        "name": "J. Bruce Fields",
        "email": "bfields@citi.umich.edu",
        "time": "Wed Mar 24 10:40:46 2010 -0400"
      },
      "message": "sunrpc/cache: fix module refcnt leak in a failure path\n\nDon\u0027t forget to release the module refcnt if seq_open() returns failure.\n\nSigned-off-by: Li Zefan \u003clizf@cn.fujitsu.com\u003e\nCc: J. Bruce Fields \u003cbfields@fieldses.org\u003e\nCc: Neil Brown \u003cneilb@suse.de\u003e\nCc: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: J. Bruce Fields \u003cbfields@citi.umich.edu\u003e\n"
    },
    {
      "commit": "8e039d84b323c4503c4d56863faa47c783660826",
      "tree": "fd3fed884bf5f6309893d6844cabb9dcf3f9838a",
      "parents": [
        "688328c7ec3cd0dc3b16342aeb045d28012cc955"
      ],
      "author": {
        "name": "Ben Blum",
        "email": "bblum@andrew.cmu.edu",
        "time": "Tue Mar 23 05:24:03 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Mar 23 13:06:14 2010 -0700"
      },
      "message": "cgroups: net_cls as module\n\nAllows the net_cls cgroup subsystem to be compiled as a module\n\nThis patch modifies net/sched/cls_cgroup.c to allow the net_cls subsystem\nto be optionally compiled as a module instead of builtin.  The\ncgroup_subsys struct is moved around a bit to allow the subsys_id to be\neither declared as a compile-time constant by the cgroup_subsys.h include\nin cgroup.h, or, if it\u0027s a module, initialized within the struct by\ncgroup_load_subsys.\n\nSigned-off-by: Ben Blum \u003cbblum@andrew.cmu.edu\u003e\nAcked-by: Li Zefan \u003clizf@cn.fujitsu.com\u003e\nCc: Paul Menage \u003cmenage@google.com\u003e\nCc: \"David S. Miller\" \u003cdavem@davemloft.net\u003e\nCc: KAMEZAWA Hiroyuki \u003ckamezawa.hiroyu@jp.fujitsu.com\u003e\nCc: Lai Jiangshan \u003claijs@cn.fujitsu.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5fc05f8764f301138003ff562a31ad3721f1675f",
      "tree": "7c5a3d9179ce0fc23829302149aaa1d2e1d1a4ab",
      "parents": [
        "21afc27c9f9ae1f6370c47b323be7f3b75106569"
      ],
      "author": {
        "name": "Amerigo Wang",
        "email": "amwang@redhat.com",
        "time": "Sun Mar 21 22:59:58 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 22 20:05:45 2010 -0700"
      },
      "message": "netpoll: warn when there are spaces in parameters\n\nv2: update according to Frans\u0027 comments.\n\nCurrently, if we leave spaces before dst port,\nnetconsole will silently accept it as 0. Warn about this.\n\nAlso, when spaces appear in other places, make them\nvisible in error messages.\n\nSigned-off-by: WANG Cong \u003camwang@redhat.com\u003e\nCc: David Miller \u003cdavem@davemloft.net\u003e\nAcked-by: Neil Horman \u003cnhorman@tuxdriver.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ef1691504c83ba3eb636c0cfd3ed33f7a6d0b4ee",
      "tree": "7eac65d59454eb5d4f8b1495f3977d6ac0113364",
      "parents": [
        "220bf991b0366cc50a94feede3d7341fa5710ee4"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Mar 22 18:25:20 2010 +0100"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Mar 22 18:25:20 2010 +0100"
      },
      "message": "netfilter: xt_recent: fix regression in rules using a zero hit_count\n\nCommit 8ccb92ad (netfilter: xt_recent: fix false match) fixed supposedly\nfalse matches in rules using a zero hit_count. As it turns out there is\nnothing false about these matches and people are actually using entries\nwith a hit_count of zero to make rules dependant on addresses inserted\nmanually through /proc.\n\nSince this slipped past the eyes of three reviewers, instead of\nreverting the commit in question, this patch explicitly checks\nfor a hit_count of zero to make the intentions more clear.\n\nReported-by: Thomas Jarosch \u003cthomas.jarosch@intra2net.com\u003e\nTested-by: Thomas Jarosch \u003cthomas.jarosch@intra2net.com\u003e\nCc: stable@kernel.org\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "258152acc09c5c2df97002cd58cb37cb241aacde",
      "tree": "03bcfc3e0b97f453af77b97076dd28eb1716a4fa",
      "parents": [
        "e91924158d89086357e46887c23d714cfb4e05ea",
        "243aad830e8a4cdda261626fbaeddde16b08d04a"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Mar 22 10:01:58 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Mar 22 10:01:58 2010 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (38 commits)\n  ip_gre: include route header_len in max_headroom calculation\n  if_tunnel.h: add missing ams/byteorder.h include\n  ipv4: Don\u0027t drop redirected route cache entry unless PTMU actually expired\n  net: suppress lockdep-RCU false positive in FIB trie.\n  Bluetooth: Fix kernel crash on L2CAP stress tests\n  Bluetooth: Convert debug files to actually use debugfs instead of sysfs\n  Bluetooth: Fix potential bad memory access with sysfs files\n  netfilter: ctnetlink: fix reliable event delivery if message building fails\n  netlink: fix NETLINK_RECV_NO_ENOBUFS in netlink_set_err()\n  NET_DMA: free skbs periodically\n  netlink: fix unaligned access in nla_get_be64()\n  tcp: Fix tcp_mark_head_lost() with packets \u003d\u003d 0\n  net: ipmr/ip6mr: fix potential out-of-bounds vif_table access\n  KS8695: update ksp-\u003enext_rx_desc_read at the end of rx loop\n  igb: Add support for 82576 ET2 Quad Port Server Adapter\n  ixgbevf: Message formatting cleanups\n  ixgbevf: Shorten up delay timer for watchdog task\n  ixgbevf: Fix VF Stats accounting after reset\n  ixgbe: Set IXGBE_RSC_CB(skb)-\u003eDMA field to zero after unmapping the address\n  ixgbe: fix for real_num_tx_queues update issue\n  ...\n"
    },
    {
      "commit": "c3824d21eb653fe7017476724257ccaa8bf3d9e1",
      "tree": "1e037cc43b40385ba31b2d7ef24275165c294cf0",
      "parents": [
        "99b437a9257cb6b267bf32adfb7675948dc6d485"
      ],
      "author": {
        "name": "Tetsuo Handa",
        "email": "penguin-kernel@I-love.SAKURA.ne.jp",
        "time": "Mon Mar 22 13:50:19 2010 +0000"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Mar 22 09:57:19 2010 -0700"
      },
      "message": "rxrpc: Check allocation failure.\n\nalloc_skb() can return NULL.\n\nSigned-off-by: Tetsuo Handa \u003cpenguin-kernel@I-love.SAKURA.ne.jp\u003e\nSigned-off-by: David Howells \u003cdhowells@redhat.com\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "f1f0abe192a72e75d7c59972e30784d043fd8d73",
      "tree": "ec805bee0fea179ad4b5e8a3d09e3ee0914a4186",
      "parents": [
        "ff0901f8036a1586037c30a365c9666e946af0f1"
      ],
      "author": {
        "name": "Dan Carpenter",
        "email": "error27@gmail.com",
        "time": "Sun Mar 21 12:10:34 2010 -0400"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Mon Mar 22 05:34:13 2010 -0400"
      },
      "message": "sunrpc: handle allocation errors from __rpc_lookup_create()\n\n__rpc_lookup_create() can return ERR_PTR(-ENOMEM).\n\nSigned-off-by: Dan Carpenter \u003cerror27@gmail.com\u003e\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\nCc: stable@kernel.org\n"
    },
    {
      "commit": "ff0901f8036a1586037c30a365c9666e946af0f1",
      "tree": "0ac6bf41e2d0837dfa7107052f741d78a08a6dd7",
      "parents": [
        "c9acb42ef1904d15d0fb315061cefbe638f67f3a"
      ],
      "author": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Fri Mar 19 16:17:45 2010 -0400"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Mon Mar 22 05:34:12 2010 -0400"
      },
      "message": "SUNRPC: Fix the return value of rpc_run_bc_task()\n\nCurrently rpc_run_bc_task() will return NULL if the task allocation failed.\nHowever the only caller is bc_send, which assumes that the return value\nwill be an ERR_PTR.\n\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\n"
    },
    {
      "commit": "c9acb42ef1904d15d0fb315061cefbe638f67f3a",
      "tree": "7c94dff168dfc90a279990cb2860cce626ae76a3",
      "parents": [
        "cdead7cf12896c0e50a8be2e52de52c364603095"
      ],
      "author": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Fri Mar 19 15:36:22 2010 -0400"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Mon Mar 22 05:32:44 2010 -0400"
      },
      "message": "SUNRPC: Fix a use after free bug with the NFSv4.1 backchannel\n\nThe -\u003erelease_request() callback was designed to allow the transport layer\nto do housekeeping after the RPC call is done. It cannot be used to free\nthe request itself, and doing so leads to a use-after-free bug in\nxprt_release().\n\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\n"
    },
    {
      "commit": "243aad830e8a4cdda261626fbaeddde16b08d04a",
      "tree": "3c8de91b5249846dede05c1a3a74387e0eda0470",
      "parents": [
        "9bf35c8dddd56f7f247a27346f74f5adc18071f4"
      ],
      "author": {
        "name": "Timo Teräs",
        "email": "timo.teras@iki.fi",
        "time": "Sat Mar 20 02:27:58 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 21 21:23:28 2010 -0700"
      },
      "message": "ip_gre: include route header_len in max_headroom calculation\n\nTaking route\u0027s header_len into account, and updating gre device\nneeded_headroom will give better hints on upper bound of required\nheadroom. This is useful if the gre traffic is xfrm\u0027ed.\n\nSigned-off-by: Timo Teras \u003ctimo.teras@iki.fi\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5e016cbf6cffd4a53b7922e0c91b775399d7fe47",
      "tree": "6ad4b48375958de4f4c47e4ac674ec55da42f7f2",
      "parents": [
        "e3a61d47cc37c51834abe537e0ed685829d56ee2"
      ],
      "author": {
        "name": "Guenter Roeck",
        "email": "guenter.roeck@ericsson.com",
        "time": "Sun Mar 21 20:55:13 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 21 20:55:13 2010 -0700"
      },
      "message": "ipv4: Don\u0027t drop redirected route cache entry unless PTMU actually expired\n\nTCP sessions over IPv4 can get stuck if routers between endpoints\ndo not fragment packets but implement PMTU instead, and we are using\nthose routers because of an ICMP redirect.\n\nSetup is as follows\n\n       MTU1    MTU2   MTU1\n    A--------B------C------D\n\nwith MTU1 \u003e MTU2. A and D are endpoints, B and C are routers. B and C\nimplement PMTU and drop packets larger than MTU2 (for example because\nDF is set on all packets). TCP sessions are initiated between A and D.\nThere is packet loss between A and D, causing frequent TCP\nretransmits.\n\nAfter the number of retransmits on a TCP session reaches tcp_retries1,\ntcp calls dst_negative_advice() prior to each retransmit. This results\nin route cache entries for the peer to be deleted in\nipv4_negative_advice() if the Path MTU is set.\n\nIf the outstanding data on an affected TCP session is larger than\nMTU2, packets sent from the endpoints will be dropped by B or C, and\nICMP NEEDFRAG will be returned. A and D receive NEEDFRAG messages and\nupdate PMTU.\n\nBefore the next retransmit, tcp will again call dst_negative_advice(),\ncausing the route cache entry (with correct PMTU) to be deleted. The\nretransmitted packet will be larger than MTU2, causing it to be\ndropped again.\n\nThis sequence repeats until the TCP session aborts or is terminated.\n\nProblem is fixed by removing redirected route cache entries in\nipv4_negative_advice() only if the PMTU is expired.\n\nSigned-off-by: Guenter Roeck \u003cguenter.roeck@ericsson.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e3a61d47cc37c51834abe537e0ed685829d56ee2",
      "tree": "0d44d0916200cc49344c41db59fef568711f17b1",
      "parents": [
        "634a4b2038a6eba4c211fb906fa2f6ec9a4bbfc7",
        "c2c77ec83bdad17fb688557b5b3fdc36661dd1c6"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 21 18:03:11 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 21 18:03:11 2010 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/holtmann/bluetooth-2.6\n"
    },
    {
      "commit": "634a4b2038a6eba4c211fb906fa2f6ec9a4bbfc7",
      "tree": "69ef8d5afc51d632db7744d94f4de0224e627104",
      "parents": [
        "af98441397227a5a4f212cd48710eea72a14dbdb"
      ],
      "author": {
        "name": "Paul E. McKenney",
        "email": "paulmck@linux.vnet.ibm.com",
        "time": "Sun Mar 21 18:01:05 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 21 18:01:05 2010 -0700"
      },
      "message": "net: suppress lockdep-RCU false positive in FIB trie.\n\nAllow fib_find_node() to be called either under rcu_read_lock()\nprotection or with RTNL held.\n\nSigned-off-by: Paul E. McKenney \u003cpaulmck@linux.vnet.ibm.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cdead7cf12896c0e50a8be2e52de52c364603095",
      "tree": "0702010a10dadca0a597ab071f3678d5c843047b",
      "parents": [
        "d812e575822a2b7ab1a7cadae2571505ec6ec2bd"
      ],
      "author": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Fri Mar 19 15:36:22 2010 -0400"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Sun Mar 21 12:22:49 2010 -0400"
      },
      "message": "SUNRPC: Fix a potential memory leak in auth_gss\n\nThe function alloc_enc_pages() currently fails to release the pointer\nrqstp-\u003erq_enc_pages in the error path.\n\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\nAcked-by: J. Bruce Fields \u003cbfields@citi.umich.edu\u003e\nCc: stable@kernel.org\n"
    },
    {
      "commit": "c2c77ec83bdad17fb688557b5b3fdc36661dd1c6",
      "tree": "d213eafcc44b8c8fdc5f8c61d65acb6ef5de5e4e",
      "parents": [
        "aef7d97cc604309b66f6f45cce02cd734934cd4e"
      ],
      "author": {
        "name": "Andrei Emeltchenko",
        "email": "andrei.emeltchenko@nokia.com",
        "time": "Fri Mar 19 10:26:28 2010 +0200"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sun Mar 21 05:49:36 2010 +0100"
      },
      "message": "Bluetooth: Fix kernel crash on L2CAP stress tests\n\nAdded very simple check that req buffer has enough space to\nfit configuration parameters. Shall be enough to reject packets\nwith configuration size more than req buffer.\n\nCrash trace below\n\n[ 6069.659393] Unable to handle kernel paging request at virtual address 02000205\n[ 6069.673034] Internal error: Oops: 805 [#1] PREEMPT\n...\n[ 6069.727172] PC is at l2cap_add_conf_opt+0x70/0xf0 [l2cap]\n[ 6069.732604] LR is at l2cap_recv_frame+0x1350/0x2e78 [l2cap]\n...\n[ 6070.030303] Backtrace:\n[ 6070.032806] [\u003cbf1c2880\u003e] (l2cap_add_conf_opt+0x0/0xf0 [l2cap]) from\n[\u003cbf1c6624\u003e] (l2cap_recv_frame+0x1350/0x2e78 [l2cap])\n[ 6070.043823]  r8:dc5d3100 r7:df2a91d6 r6:00000001 r5:df2a8000 r4:00000200\n[ 6070.050659] [\u003cbf1c52d4\u003e] (l2cap_recv_frame+0x0/0x2e78 [l2cap]) from\n[\u003cbf1c8408\u003e] (l2cap_recv_acldata+0x2bc/0x350 [l2cap])\n[ 6070.061798] [\u003cbf1c814c\u003e] (l2cap_recv_acldata+0x0/0x350 [l2cap]) from\n[\u003cbf0037a4\u003e] (hci_rx_task+0x244/0x478 [bluetooth])\n[ 6070.072631]  r6:dc647700 r5:00000001 r4:df2ab740\n[ 6070.077362] [\u003cbf003560\u003e] (hci_rx_task+0x0/0x478 [bluetooth]) from\n[\u003cc006b9fc\u003e] (tasklet_action+0x78/0xd8)\n[ 6070.087005] [\u003cc006b984\u003e] (tasklet_action+0x0/0xd8) from [\u003cc006c160\u003e]\n\nSigned-off-by: Andrei Emeltchenko \u003candrei.emeltchenko@nokia.com\u003e\nAcked-by: Gustavo F. Padovan \u003cgustavo@padovan.org\u003e\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "aef7d97cc604309b66f6f45cce02cd734934cd4e",
      "tree": "b21aae56f9a5de0bbabe881d597a4dc790ff97c8",
      "parents": [
        "101545f6fef4a0a3ea8daf0b5b880df2c6a92a69"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sun Mar 21 05:27:45 2010 +0100"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sun Mar 21 05:49:35 2010 +0100"
      },
      "message": "Bluetooth: Convert debug files to actually use debugfs instead of sysfs\n\nSome of the debug files ended up wrongly in sysfs, because at that point\nof time, debugfs didn\u0027t exist. Convert these files to use debugfs and\nalso seq_file. This patch converts all of these files at once and then\nremoves the exported symbol for the Bluetooth sysfs class.\n\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "101545f6fef4a0a3ea8daf0b5b880df2c6a92a69",
      "tree": "5b4254a64db65f1958a36ec6955dbba1b71031a7",
      "parents": [
        "af98441397227a5a4f212cd48710eea72a14dbdb"
      ],
      "author": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Mon Mar 15 14:12:58 2010 -0700"
      },
      "committer": {
        "name": "Marcel Holtmann",
        "email": "marcel@holtmann.org",
        "time": "Sun Mar 21 05:49:32 2010 +0100"
      },
      "message": "Bluetooth: Fix potential bad memory access with sysfs files\n\nWhen creating a high number of Bluetooth sockets (L2CAP, SCO\nand RFCOMM) it is possible to scribble repeatedly on arbitrary\npages of memory. Ensure that the content of these sysfs files is\nalways less than one page. Even if this means truncating. The\nfiles in question are scheduled to be moved over to debugfs in\nthe future anyway.\n\nBased on initial patches from Neil Brown and Linus Torvalds\n\nReported-by: Neil Brown \u003cneilb@suse.de\u003e\nSigned-off-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\n"
    },
    {
      "commit": "37b7ef7203240b3aba577bb1ff6765fe15225976",
      "tree": "6e54b06dd07adff6e1ea52caf6715eca905dbb9a",
      "parents": [
        "1a50307ba1826e4da0024e64b245ce4eadf7688a"
      ],
      "author": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Tue Mar 16 13:30:21 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Mar 20 14:29:03 2010 -0700"
      },
      "message": "netfilter: ctnetlink: fix reliable event delivery if message building fails\n\nThis patch fixes a bug that allows to lose events when reliable\nevent delivery mode is used, ie. if NETLINK_BROADCAST_SEND_ERROR\nand NETLINK_RECV_NO_ENOBUFS socket options are set.\n\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1a50307ba1826e4da0024e64b245ce4eadf7688a",
      "tree": "48c0b788b925d6ae0877f5b95f5e0794ce0601a7",
      "parents": [
        "73852e8151b7d7a529fbe019ab6d2d0c02d8f3f2"
      ],
      "author": {
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org",
        "time": "Thu Mar 18 14:24:42 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Mar 20 14:29:03 2010 -0700"
      },
      "message": "netlink: fix NETLINK_RECV_NO_ENOBUFS in netlink_set_err()\n\nCurrently, ENOBUFS errors are reported to the socket via\nnetlink_set_err() even if NETLINK_RECV_NO_ENOBUFS is set. However,\nthat should not happen. This fixes this problem and it changes the\nprototype of netlink_set_err() to return the number of sockets that\nhave set the NETLINK_RECV_NO_ENOBUFS socket option. This return\nvalue is used in the next patch in these bugfix series.\n\nSigned-off-by: Pablo Neira Ayuso \u003cpablo@netfilter.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "73852e8151b7d7a529fbe019ab6d2d0c02d8f3f2",
      "tree": "724151d30c232e38ea947705986cfe60a3359241",
      "parents": [
        "f5d410f2ea7ba340f11815a56e05b9fa9421c421"
      ],
      "author": {
        "name": "Steven J. Magnani",
        "email": "steve@digidescorp.com",
        "time": "Tue Mar 16 05:22:44 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Mar 20 14:29:02 2010 -0700"
      },
      "message": "NET_DMA: free skbs periodically\n\nUnder NET_DMA, data transfer can grind to a halt when userland issues a\nlarge read on a socket with a high RCVLOWAT (i.e., 512 KB for both).\nThis appears to be because the NET_DMA design queues up lots of memcpy\noperations, but doesn\u0027t issue or wait for them (and thus free the\nassociated skbs) until it is time for tcp_recvmesg() to return.\nThe socket hangs when its TCP window goes to zero before enough data is\navailable to satisfy the read.\n\nPeriodically issue asynchronous memcpy operations, and free skbs for ones\nthat have completed, to prevent sockets from going into zero-window mode.\n\nSigned-off-by: Steven J. Magnani \u003csteve@digidescorp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6830c25b7d08fbbd922959425193791bc42079f2",
      "tree": "4a3175a62c62375a5b7a611914842ccc48328aa1",
      "parents": [
        "a50436f2cd6e85794f7e1aad795ca8302177b896"
      ],
      "author": {
        "name": "Lennart Schulte",
        "email": "lennart.schulte@nets.rwth-aachen.de",
        "time": "Wed Mar 17 02:16:29 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Mar 19 22:47:22 2010 -0700"
      },
      "message": "tcp: Fix tcp_mark_head_lost() with packets \u003d\u003d 0\n\nA packet is marked as lost in case packets \u003d\u003d 0, although nothing should be done.\nThis results in a too early retransmitted packet during recovery in some cases.\nThis small patch fixes this issue by returning immediately.\n\nSigned-off-by: Lennart Schulte \u003clennart.schulte@nets.rwth-aachen.de\u003e\nSigned-off-by: Arnd Hannemann \u003channemann@nets.rwth-aachen.de\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a50436f2cd6e85794f7e1aad795ca8302177b896",
      "tree": "522ac0b3ac330fb53d4ee9147f7565b27b482085",
      "parents": [
        "ea93fd9456ad32cd85b2d7914b58c6313cc40c9e"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Mar 17 06:04:14 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Mar 19 22:47:22 2010 -0700"
      },
      "message": "net: ipmr/ip6mr: fix potential out-of-bounds vif_table access\n\nmfc_parent of cache entries is used to index into the vif_table and is\ninitialised from mfcctl-\u003emfcc_parent. This can take values of to 2^16-1,\nwhile the vif_table has only MAXVIFS (32) entries. The same problem\naffects ip6mr.\n\nRefuse invalid values to fix a potential out-of-bounds access. Unlike\nthe other validity checks, this is checked in ipmr_mfc_add() instead of\nthe setsockopt handler since its unused in the delete path and might be\nuninitialized.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "97e3ecd112ba45eb217cddab59f48659bc15d9d0",
      "tree": "2e50eb442323387fd998e99ec560f58f1cdaf54e",
      "parents": [
        "10414444cb8a8ee8893e00390b7cf40502e28352"
      ],
      "author": {
        "name": "stephen hemminger",
        "email": "shemminger@vyatta.com",
        "time": "Thu Mar 18 11:27:32 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Mar 19 21:00:42 2010 -0700"
      },
      "message": "TCP: check min TTL on received ICMP packets\n\nThis adds RFC5082 checks for TTL on received ICMP packets.\nIt adds some security against spoofed ICMP packets\ndisrupting GTSM protected sessions.\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    }
  ],
  "next": "10414444cb8a8ee8893e00390b7cf40502e28352"
}
