)]}'
{
  "log": [
    {
      "commit": "51558576ead54c1047e4d41440626e4f9aa015ea",
      "tree": "ec1d609d4800dbda8c918d3142f6727dd4c2f462",
      "parents": [
        "d36e311070ee3a378a54142a168ff5cfedba33d5",
        "ec0a196626bd12e0ba108d7daa6d95a4fb25c2c5"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Jun 13 07:34:47 2008 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Jun 13 07:34:47 2008 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6:\n  tcp: Revert \u0027process defer accept as established\u0027 changes.\n  ipv6: Fix duplicate initialization of rawv6_prot.destroy\n  bnx2x: Updating the Maintainer\n  net: Eliminate flush_scheduled_work() calls while RTNL is held.\n  drivers/net/r6040.c: correct bad use of round_jiffies()\n  fec_mpc52xx: MPC52xx_MESSAGES_DEFAULT: 2nd NETIF_MSG_IFDOWN \u003d\u003e IFUP\n  ipg: fix receivemode IPG_RM_RECEIVEMULTICAST{,HASH} in ipg_nic_set_multicast_list()\n  netfilter: nf_conntrack: fix ctnetlink related crash in nf_nat_setup_info()\n  netfilter: Make nflog quiet when no one listen in userspace.\n  ipv6: Fail with appropriate error code when setting not-applicable sockopt.\n  ipv6: Check IPV6_MULTICAST_LOOP option value.\n  ipv6: Check the hop limit setting in ancillary data.\n  ipv6 route: Fix route lifetime in netlink message.\n  ipv6 mcast: Check address family of gf_group in getsockopt(MS_FILTER).\n  dccp: Bug in initial acknowledgment number assignment\n  dccp ccid-3: X truncated due to type conversion\n  dccp ccid-3: TFRC reverse-lookup Bug-Fix\n  dccp ccid-2: Bug-Fix - Ack Vectors need to be ignored on request sockets\n  dccp: Fix sparse warnings\n  dccp ccid-3: Bug-Fix - Zero RTT is possible\n"
    },
    {
      "commit": "ec0a196626bd12e0ba108d7daa6d95a4fb25c2c5",
      "tree": "68d9c2923765e12853368e8edb27b241142e0c48",
      "parents": [
        "f23d60de719e639690b2dc5c2d0e4243ff614b7a"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jun 12 16:31:35 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jun 12 16:34:35 2008 -0700"
      },
      "message": "tcp: Revert \u0027process defer accept as established\u0027 changes.\n\nThis reverts two changesets, ec3c0982a2dd1e671bad8e9d26c28dcba0039d87\n(\"[TCP]: TCP_DEFER_ACCEPT updates - process as established\") and\nthe follow-on bug fix 9ae27e0adbf471c7a6b80102e38e1d5a346b3b38\n(\"tcp: Fix slab corruption with ipv6 and tcp6fuzz\").\n\nThis change causes several problems, first reported by Ingo Molnar\nas a distcc-over-loopback regression where connections were getting\nstuck.\n\nIlpo Järvinen first spotted the locking problems.  The new function\nadded by this code, tcp_defer_accept_check(), only has the\nchild socket locked, yet it is modifying state of the parent\nlistening socket.\n\nFixing that is non-trivial at best, because we can\u0027t simply just grab\nthe parent listening socket lock at this point, because it would\ncreate an ABBA deadlock.  The normal ordering is parent listening\nsocket --\u003e child socket, but this code path would require the\nreverse lock ordering.\n\nNext is a problem noticed by Vitaliy Gusev, he noted:\n\n----------------------------------------\n\u003e--- a/net/ipv4/tcp_timer.c\n\u003e+++ b/net/ipv4/tcp_timer.c\n\u003e@@ -481,6 +481,11 @@ static void tcp_keepalive_timer (unsigned long data)\n\u003e \t\tgoto death;\n\u003e \t}\n\u003e\n\u003e+\tif (tp-\u003edefer_tcp_accept.request \u0026\u0026 sk-\u003esk_state \u003d\u003d TCP_ESTABLISHED) {\n\u003e+\t\ttcp_send_active_reset(sk, GFP_ATOMIC);\n\u003e+\t\tgoto death;\n\nHere socket sk is not attached to listening socket\u0027s request queue. tcp_done()\nwill not call inet_csk_destroy_sock() (and tcp_v4_destroy_sock() which should\nrelease this sk) as socket is not DEAD. Therefore socket sk will be lost for\nfreeing.\n----------------------------------------\n\nFinally, Alexey Kuznetsov argues that there might not even be any\nreal value or advantage to these new semantics even if we fix all\nof the bugs:\n\n----------------------------------------\nHiding from accept() sockets with only out-of-order data only\nis the only thing which is impossible with old approach. Is this really\nso valuable? My opinion: no, this is nothing but a new loophole\nto consume memory without control.\n----------------------------------------\n\nSo revert this thing for now.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f23d60de719e639690b2dc5c2d0e4243ff614b7a",
      "tree": "39e8083b98c476978ce45f0a4fc4de111554f786",
      "parents": [
        "24e3fcefb9cc61acce59ed54c00c4e4c32537de7"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jun 12 14:47:58 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jun 12 16:34:34 2008 -0700"
      },
      "message": "ipv6: Fix duplicate initialization of rawv6_prot.destroy\n\nIn changeset 22dd485022f3d0b162ceb5e67d85de7c3806aa20\n(\"raw: Raw socket leak.\") code was added so that we\nflush pending frames on raw sockets to avoid leaks.\n\nThe ipv4 part was fine, but the ipv6 part was not\ndone correctly.  Unlike the ipv4 side, the ipv6 code\nalready has a .destroy method for rawv6_prot.\n\nSo now there were two assignments to this member, and\nwhat the compiler does is use the last one, effectively\nmaking the ipv6 parts of that changeset a NOP.\n\nFix this by removing the:\n\n\t.destroy\t   \u003d inet6_destroy_sock,\n\nline, and adding an inet6_destroy_sock() call to the\nend of raw6_destroy().\n\nNoticed by Al Viro.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nAcked-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "a4056573873dc9fc506ce9293c4d01670101a637",
      "tree": "c73ada69fe049ed0feaf744cc060985d00120bf9",
      "parents": [
        "5cb960a80531211379f8f05c575725d7630098fe",
        "1717699cd5130009b7cd6756e883d8582c1fe706"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 11 18:11:16 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 11 18:11:16 2008 -0700"
      },
      "message": "Merge branch \u0027net-2.6-misc-20080611a\u0027 of git://git.linux-ipv6.org/gitroot/yoshfuji/linux-2.6-fix\n"
    },
    {
      "commit": "5cb960a80531211379f8f05c575725d7630098fe",
      "tree": "aee22f43cf5c2ae26a6994e6aa5c427285ff0ff4",
      "parents": [
        "ceeff7541e5a4ba8e8d97ffbae32b3f283cb7a3f",
        "be4c798a41bf626cdaacf96c382f116ed2f7dbe9"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 11 17:53:04 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 11 17:53:04 2008 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://eden-feed.erg.abdn.ac.uk/net-2.6\n"
    },
    {
      "commit": "ceeff7541e5a4ba8e8d97ffbae32b3f283cb7a3f",
      "tree": "93d2074ac54895daf981fed524989d892bfcb346",
      "parents": [
        "b66985b11b8b00e1ec65b89a3112510ac9a9ec6e"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Jun 11 17:51:10 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 11 17:51:10 2008 -0700"
      },
      "message": "netfilter: nf_conntrack: fix ctnetlink related crash in nf_nat_setup_info()\n\nWhen creation of a new conntrack entry in ctnetlink fails after having\nset up the NAT mappings, the conntrack has an extension area allocated\nthat is not getting properly destroyed when freeing the conntrack again.\nThis means the NAT extension is still in the bysource hash, causing a\ncrash when walking over the hash chain the next time:\n\nBUG: unable to handle kernel paging request at 00120fbd\nIP: [\u003cc03d394b\u003e] nf_nat_setup_info+0x221/0x58a\n*pde \u003d 00000000\nOops: 0000 [#1] PREEMPT SMP\n\nPid: 2795, comm: conntrackd Not tainted (2.6.26-rc5 #1)\nEIP: 0060:[\u003cc03d394b\u003e] EFLAGS: 00010206 CPU: 1\nEIP is at nf_nat_setup_info+0x221/0x58a\nEAX: 00120fbd EBX: 00120fbd ECX: 00000001 EDX: 00000000\nESI: 0000019e EDI: e853bbb4 EBP: e853bbc8 ESP: e853bb78\n DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068\nProcess conntrackd (pid: 2795, ti\u003de853a000 task\u003df7de10f0 task.ti\u003de853a000)\nStack: 00000000 e853bc2c e85672ec 00000008 c0561084 63c1db4a 00000000 00000000\n       00000000 0002e109 61d2b1c3 00000000 00000000 00000000 01114e22 61d2b1c3\n       00000000 00000000 f7444674 e853bc04 00000008 c038e728 0000000a f7444674\nCall Trace:\n [\u003cc038e728\u003e] nla_parse+0x5c/0xb0\n [\u003cc0397c1b\u003e] ctnetlink_change_status+0x190/0x1c6\n [\u003cc0397eec\u003e] ctnetlink_new_conntrack+0x189/0x61f\n [\u003cc0119aee\u003e] update_curr+0x3d/0x52\n [\u003cc03902d1\u003e] nfnetlink_rcv_msg+0xc1/0xd8\n [\u003cc0390228\u003e] nfnetlink_rcv_msg+0x18/0xd8\n [\u003cc0390210\u003e] nfnetlink_rcv_msg+0x0/0xd8\n [\u003cc038d2ce\u003e] netlink_rcv_skb+0x2d/0x71\n [\u003cc0390205\u003e] nfnetlink_rcv+0x19/0x24\n [\u003cc038d0f5\u003e] netlink_unicast+0x1b3/0x216\n ...\n\nMove invocation of the extension destructors to nf_conntrack_free()\nto fix this problem.\n\nFixes http://bugzilla.kernel.org/show_bug.cgi?id\u003d10875\n\nReported-and-Tested-by: Krzysztof Piotr Oledzki \u003cole@ans.pl\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b66985b11b8b00e1ec65b89a3112510ac9a9ec6e",
      "tree": "0ec9a7e93098ff8d816561af28f71bf056beb164",
      "parents": [
        "513fd370e6832f81ab717df4645f5ce679e44f14"
      ],
      "author": {
        "name": "Eric Leblond",
        "email": "eric@inl.fr",
        "time": "Wed Jun 11 17:50:27 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 11 17:50:27 2008 -0700"
      },
      "message": "netfilter: Make nflog quiet when no one listen in userspace.\n\nThe message \"nf_log_packet: can\u0027t log since no backend logging module loaded\nin! Please either load one, or disable logging explicitly\" was displayed for\neach logged packet when no userspace application is listening to nflog events.\nThe message seems to warn for a problem with a kernel module missing but as\nsaid before this is not the case. I thus propose to suppress the message (I\ndon\u0027t see any reason to flood the log because a user application has crashed.)\n\nSigned-off-by: Eric Leblond \u003ceric@inl.fr\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1717699cd5130009b7cd6756e883d8582c1fe706",
      "tree": "884f77b16c05578522eb4d8ad8d585eb008df60d",
      "parents": [
        "28d4488216645cd71402925cffde9528b0cfdb7e"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 12 03:27:26 2008 +0900"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 12 09:19:09 2008 +0900"
      },
      "message": "ipv6: Fail with appropriate error code when setting not-applicable sockopt.\n\nIPV6_MULTICAST_HOPS, for example, is not valid for stream sockets.\nSince they are virtually unavailable for stream sockets,\nwe should return ENOPROTOOPT instead of EINVAL.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "28d4488216645cd71402925cffde9528b0cfdb7e",
      "tree": "c382b026e6c480827f0c539e3d2dcf3943389347",
      "parents": [
        "e8766fc86b34d44a8c55a2f9d71da69e091b1ca4"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 12 03:14:51 2008 +0900"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 12 09:19:09 2008 +0900"
      },
      "message": "ipv6: Check IPV6_MULTICAST_LOOP option value.\n\nOnly 0 and 1 are valid for IPV6_MULTICAST_LOOP socket option,\nand we should return an error of EINVAL otherwise, per RFC3493.\n\nBased on patch from Shan Wei \u003cshanwei@cn.fujitsu.com\u003e.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "e8766fc86b34d44a8c55a2f9d71da69e091b1ca4",
      "tree": "c96952c8a6250c48036adcf51c6ef0bcc8d8c770",
      "parents": [
        "36e3deae8ba84865fd9eb3f2f21bbc00d49b7544"
      ],
      "author": {
        "name": "Shan Wei",
        "email": "shanwei@cn.fujitsu.com",
        "time": "Tue Jun 10 15:50:55 2008 +0800"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 12 09:19:08 2008 +0900"
      },
      "message": "ipv6: Check the hop limit setting in ancillary data.\n\nWhen specifing the outgoing hop limit as ancillary data for sendmsg(),\nthe kernel doesn\u0027t check the integer hop limit value as specified in\n[RFC-3542] section 6.3.\n\nSigned-off-by: Shan Wei \u003cshanwei@cn.fujitsu.com\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "36e3deae8ba84865fd9eb3f2f21bbc00d49b7544",
      "tree": "d78448c8c5b9570c2c1066e03a4dc31a73b2085b",
      "parents": [
        "20c61fbd8deb2ada0ac3acecf6156a986dbfff2d"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Tue May 13 02:52:55 2008 +0900"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 12 09:19:08 2008 +0900"
      },
      "message": "ipv6 route: Fix route lifetime in netlink message.\n\n1) We may have route lifetime larger than INT_MAX.\nIn that case we had wired value in lifetime.\nUse INT_MAX if lifetime does not fit in s32.\n\n2) Lifetime is valid iif RTF_EXPIRES is set.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "20c61fbd8deb2ada0ac3acecf6156a986dbfff2d",
      "tree": "0be06a3736b60a6c3586e39dbc43031a2e3dace7",
      "parents": [
        "513fd370e6832f81ab717df4645f5ce679e44f14"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Mon Apr 28 14:40:55 2008 +0900"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 12 09:19:08 2008 +0900"
      },
      "message": "ipv6 mcast: Check address family of gf_group in getsockopt(MS_FILTER).\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "f7f866eed01b7a03dd5aa36daf3c2c2721f922da",
      "tree": "b2871f376e3db490955c2fda623c01c3f615d699",
      "parents": [
        "7427d8b815c7fc0b005a17cf3952b7ebef0481d2",
        "513fd370e6832f81ab717df4645f5ce679e44f14"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Jun 11 08:39:51 2008 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Jun 11 08:39:51 2008 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (42 commits)\n  net: Fix routing tables with id \u003e 255 for legacy software\n  sky2: Hold RTNL while calling dev_close()\n  s2io iomem annotations\n  atl1: fix suspend regression\n  qeth: start dev queue after tx drop error\n  qeth: Prepare-function to call s390dbf was wrong\n  qeth: reduce number of kernel messages\n  qeth: Use ccw_device_get_id().\n  qeth: layer 3 Oops in ip event handler\n  virtio: use callback on empty in virtio_net\n  virtio: virtio_net free transmit skbs in a timer\n  virtio: Fix typo in virtio_net_hdr comments\n  virtio_net: Fix skb-\u003ecsum_start computation\n  ehea: set mac address fix\n  sfc: Recover from RX queue flush failure\n  add missing lance_* exports\n  ixgbe: fix typo\n  forcedeth: msi interrupts\n  ipsec: pfkey should ignore events when no listeners\n  pppoe: Unshare skb before anything else\n  ...\n"
    },
    {
      "commit": "be4c798a41bf626cdaacf96c382f116ed2f7dbe9",
      "tree": "437f5d1e9d6a19c857d47055bc3dfc68a2b2b004",
      "parents": [
        "7deb0f851003287d7e259bf6b33548b144c0f2d5"
      ],
      "author": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Jun 11 11:19:10 2008 +0100"
      },
      "committer": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Jun 11 11:19:10 2008 +0100"
      },
      "message": "dccp: Bug in initial acknowledgment number assignment\n\nStep 8.5 in RFC 4340 says for the newly cloned socket\n\n           Initialize S.GAR :\u003d S.ISS,\n\nbut what in fact the code (minisocks.c) does is\n\n           Initialize S.GAR :\u003d S.ISR,\n\nwhich is wrong (typo?) -- fixed by the patch.\n\nSigned-off-by: Gerrit Renker \u003cgerrit@erg.abdn.ac.uk\u003e\n"
    },
    {
      "commit": "7deb0f851003287d7e259bf6b33548b144c0f2d5",
      "tree": "8ede694c4b6cd41224f7165d09d3f5935d889fd1",
      "parents": [
        "1e8a287c79f64226541f5c44aa52d4698bb84cf5"
      ],
      "author": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Jun 11 11:19:10 2008 +0100"
      },
      "committer": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Jun 11 11:19:10 2008 +0100"
      },
      "message": "dccp ccid-3: X truncated due to type conversion\n\nThis fixes a bug in computing the inter-packet-interval t_ipi \u003d s/X: \n\n scaled_div32(a, b) uses u32 for b, but in \"scaled_div32(s, X)\" the type of the\n sending rate `X\u0027 is u64. Since X is scaled by 2^6, this truncates rates greater\n than 2^26 Bps (~537 Mbps).\n\nUsing full 64-bit division now.\n\nSigned-off-by: Gerrit Renker \u003cgerrit@erg.abdn.ac.uk\u003e\n"
    },
    {
      "commit": "1e8a287c79f64226541f5c44aa52d4698bb84cf5",
      "tree": "a280516dae548981cd9c9f981cc7bd8ec879baf2",
      "parents": [
        "65907a433ac0ca450c4408080f24c6e4743386b2"
      ],
      "author": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Jun 11 11:19:10 2008 +0100"
      },
      "committer": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Jun 11 11:19:10 2008 +0100"
      },
      "message": "dccp ccid-3: TFRC reverse-lookup Bug-Fix\n\nThis fixes a bug in the reverse lookup of p: given a value f(p), instead of p,\nthe function returned the smallest tabulated value f(p).\n\nThe smallest tabulated value of\n\t \n   10^6 * f(p) \u003d  sqrt(2*p/3) + 12 * sqrt(3*p/8) * (32 * p^3 + p) \n\nfor p\u003d0.0001 is 8172. \n\nSince this value is scaled by 10^6, the outcome of this bug is that a loss\nof 8172/10^6 \u003d 0.8172% was reported whenever the input was below the table\nresolution of 0.01%.\n\nThis means that the value was over 80 times too high, resulting in large spikes\nof the initial loss interval, thus unnecessarily reducing the throughput.\n\nAlso corrected the printk format (%u for u32).\n\nSigned-off-by: Gerrit Renker \u003cgerrit@erg.abdn.ac.uk\u003e\n"
    },
    {
      "commit": "65907a433ac0ca450c4408080f24c6e4743386b2",
      "tree": "086656bf856f17038ca040a9bfb8e4c63e3707a3",
      "parents": [
        "1e2f0e5e8376f2a0ada8760fc9d3104e1a81382b"
      ],
      "author": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Jun 11 11:19:09 2008 +0100"
      },
      "committer": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Jun 11 11:19:09 2008 +0100"
      },
      "message": "dccp ccid-2: Bug-Fix - Ack Vectors need to be ignored on request sockets\n\nThis fixes an oversight from an earlier patch, ensuring that Ack Vectors\nare not processed on request sockets.\n\nThe issue is that Ack Vectors must not be parsed on request sockets, since\nthe Ack Vector feature depends on the selection of the (TX) CCID. During the\ninitial handshake the CCIDs are undefined, and so RFC 4340, 10.3 applies:\n\n \"Using CCID-specific options and feature options during a negotiation\n  for the corresponding CCID feature is NOT RECOMMENDED [...]\"\n\nAnd it is not even possible: when the server receives the Request from the \nclient, the CCID and Ack vector features are undefined; when the Ack finalising\nthe 3-way hanshake arrives, the request socket has not been cloned yet into a\nfull socket. (This order is necessary, since otherwise the newly created socket\nwould have to be destroyed whenever an option error occurred - a malicious\nhacker could simply send garbage options and exploit this.)\n\nSigned-off-by: Gerrit Renker \u003cgerrit@erg.abdn.ac.uk\u003e\n"
    },
    {
      "commit": "1e2f0e5e8376f2a0ada8760fc9d3104e1a81382b",
      "tree": "8e0dc375e574092814d7d020292cf6df67db5bb1",
      "parents": [
        "3294f202dc1acd82223e83ef59f272bd87bb06b2"
      ],
      "author": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Jun 11 11:19:09 2008 +0100"
      },
      "committer": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Jun 11 11:19:09 2008 +0100"
      },
      "message": "dccp: Fix sparse warnings\n\nThis patch fixes the following sparse warnings:\n * nested min(max()) expression:\n   net/dccp/ccids/ccid3.c:91:21: warning: symbol \u0027__x\u0027 shadows an earlier one\n   net/dccp/ccids/ccid3.c:91:21: warning: symbol \u0027__y\u0027 shadows an earlier one\n   \n * Declaration of function prototypes in .c instead of .h file, resulting in\n   \"should it be static?\" warnings. \n\n * Declared \"struct dccpw\" static (local to dccp_probe).\n \n * Disabled dccp_delayed_ack() - not fully removed due to RFC 4340, 11.3\n   (\"Receivers SHOULD implement delayed acknowledgement timers ...\").\n\n * Used a different local variable name to avoid\n   net/dccp/ackvec.c:293:13: warning: symbol \u0027state\u0027 shadows an earlier one\n   net/dccp/ackvec.c:238:33: originally declared here\n\n * Removed unused functions `dccp_ackvector_print\u0027 and `dccp_ackvec_print\u0027.\n\nSigned-off-by: Gerrit Renker \u003cgerrit@erg.abdn.ac.uk\u003e\n"
    },
    {
      "commit": "3294f202dc1acd82223e83ef59f272bd87bb06b2",
      "tree": "b3841a093322afbc7cd608ccc6ae60debe8c015a",
      "parents": [
        "513fd370e6832f81ab717df4645f5ce679e44f14"
      ],
      "author": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Jun 11 11:19:09 2008 +0100"
      },
      "committer": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Jun 11 11:19:09 2008 +0100"
      },
      "message": "dccp ccid-3: Bug-Fix - Zero RTT is possible\n\nIn commit $(825de27d9e40b3117b29a79d412b7a4b78c5d815) (from 27th May, commit\nmessage `dccp ccid-3: Fix \"t_ipi explosion\" bug\u0027), the CCID-3 window counter\ncomputation was fixed to cope with RTTs \u003c 4 microseconds.\n\nSuch RTTs can be found e.g. when running CCID-3 over loopback. The fix removed\na check against RTT \u003c 4, but introduced a divide-by-zero bug.\n\nAll steady-state RTTs in DCCP are filtered using dccp_sample_rtt(), which\nensures non-zero samples. However, a zero RTT is possible on initialisation,\nwhen there is no RTT sample from the Request/Response exchange.\n\nThe fix is to use the fallback-RTT from RFC 4340, 3.4.\n\nThis is also better than just fixing update_win_count() since it allows other\nparts of the code to always assume that the RTT is non-zero during the time\nthat the CCID is used.\n\nSigned-off-by: Gerrit Renker \u003cgerrit@erg.abdn.ac.uk\u003e\n"
    },
    {
      "commit": "709772e6e06564ed94ba740de70185ac3d792773",
      "tree": "17f94a2db1a8b47595a9440de0f7f375fae59134",
      "parents": [
        "99c6f60e72f112b57ddb07abb2e5f771ee211f43"
      ],
      "author": {
        "name": "Krzysztof Piotr Oledzki",
        "email": "ole@ans.pl",
        "time": "Tue Jun 10 15:44:49 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jun 10 15:44:49 2008 -0700"
      },
      "message": "net: Fix routing tables with id \u003e 255 for legacy software\n\nMost legacy software do not like tables \u003e 255 as rtm_table is u8\nso tb_id is sent \u00260xff and it is possible to mismatch for example\ntable 510 with table 254 (main).\n\nThis patch introduces RT_TABLE_COMPAT\u003d252 so the code uses it if\ntb_id \u003e 255. It makes such old applications happy, new\nones are still able to use RTA_TABLE to get a proper table id.\n\nSigned-off-by: Krzysztof Piotr Oledzki \u003cole@ans.pl\u003e\nAcked-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "99c6f60e72f112b57ddb07abb2e5f771ee211f43",
      "tree": "b955bdf6f02ad700adb0bffd4bcd1c3fc0a20366",
      "parents": [
        "bc6cffd177f9266af38dba96a2cea06c1e7ff932"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Tue Jun 10 14:25:34 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jun 10 14:25:34 2008 -0700"
      },
      "message": "ipsec: pfkey should ignore events when no listeners\n\nWhen pfkey has no km listeners, it still does a lot of work\nbefore finding out there aint nobody out there.\nIf a tree falls in a forest and no one is around to hear it, does it make\na sound? In this case it makes a lot of noise:\nWith this short-circuit adding 10s of thousands of SAs using\nnetlink improves performance by ~10%.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ce4a7d0d48bbaed78ccbb0bafb9229651a40303a",
      "tree": "df8770ef69c71a0d6935154add3ff3f4bb8dbc3a",
      "parents": [
        "45d465bc237ab1e1ebb4c65b9b318830dafb7509"
      ],
      "author": {
        "name": "Arnaldo Carvalho de Melo",
        "email": "acme@redhat.com",
        "time": "Tue Jun 10 12:39:35 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jun 10 12:39:35 2008 -0700"
      },
      "message": "inet{6}_request_sock: Init -\u003eopt and -\u003epktopts in the constructor\n\nWei Yongjun noticed that we may call reqsk_free on request sock objects where\nthe opt fields may not be initialized, fix it by introducing inet_reqsk_alloc\nwhere we initialize -\u003eopt to NULL and set -\u003epktopts to NULL in\ninet6_reqsk_alloc.\n\nSigned-off-by: Arnaldo Carvalho de Melo \u003cacme@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2e761e0532a784816e7e822dbaaece8c5d4be14d",
      "tree": "9513ffae037602a5736c8a8b0aabc5b764631c98",
      "parents": [
        "1420a4faee7086b6811b4a1f0672e32b5a6df80e"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Mon Jun 09 15:53:30 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jun 09 15:53:30 2008 -0700"
      },
      "message": "ipv6 netns: init net is used to set bindv6only for new sock\n\nThe bindv6only is tuned via sysctl. It is already on a struct net\nand per-net sysctls allow for its modification (ipv6_sysctl_net_init).\n\nDespite this the value configured in the init net is used for the\nrest of them.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "be038b376465953c358d675cb38a611898a49dc2",
      "tree": "d635b7db02e40496a582c06e93d319260fe53ed9",
      "parents": [
        "872ba53395b2a8be08c3ea2d39e225e5b4a8cb40"
      ],
      "author": {
        "name": "Assaf Krauss",
        "email": "assaf.krauss@intel.com",
        "time": "Thu Jun 05 19:55:21 2008 +0300"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Jun 09 15:53:37 2008 -0400"
      },
      "message": "mac80211: Checking IBSS support while changing channel in ad-hoc mode\n\nThis patch adds a check to the set_channel flow. When attempting to change\nthe channel while in IBSS mode, and the new channel does not support IBSS\nmode, the flow return with an error value with no consequences on the\nmac80211 and driver state.\n\nSigned-off-by: Assaf Krauss \u003cassaf.krauss@intel.com\u003e\nSigned-off-by: Emmanuel Grumbach \u003cemmanuel.grumbach@intel.com\u003e\nSigned-off-by: Tomas Winkler \u003ctomas.winkler@intel.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "872ba53395b2a8be08c3ea2d39e225e5b4a8cb40",
      "tree": "9442f5a8fd3154e95be7a3ff090e07e360024d54",
      "parents": [
        "d005b1d042a1d5dcd8d898f26d8d9bb03f865284"
      ],
      "author": {
        "name": "Dan Williams",
        "email": "dcbw@redhat.com",
        "time": "Wed Jun 04 13:59:34 2008 -0400"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Jun 09 15:51:26 2008 -0400"
      },
      "message": "mac80211: decrease IBSS creation latency\n\nSufficient scans (at least 2 or 3) should have been done within 7\nseconds to find an existing IBSS to join.  This should improve IBSS\ncreation latency; and since IBSS merging is still in effect, shouldn\u0027t\nhave detrimental effects on eventual IBSS convergence.\n\nSigned-off-by: Dan Williams \u003cdcbw@redhat.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "ad81b2f97d42e13ef78bb3798e046cd5f0492980",
      "tree": "bcec9a5e984c0be1c9b9ef0e6636ddfa3c07b699",
      "parents": [
        "a01f5450401f081f07a866612121e780e0730cfd"
      ],
      "author": {
        "name": "Assaf Krauss",
        "email": "assaf.krauss@intel.com",
        "time": "Wed Jun 04 20:27:59 2008 +0300"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Jun 09 15:50:20 2008 -0400"
      },
      "message": "mac80211: Fixing slow IBSS rejoin\n\nThis patch fixes the issue of slow reconnection to an IBSS cell after\ndisconnection from it. Now the interface\u0027s bssid is reset upon ifdown.\n\nieee80211_sta_find_ibss:\nif (found \u0026\u0026 memcmp(ifsta-\u003ebssid, bssid, ETH_ALEN) !\u003d 0 \u0026\u0026\n\t    (bss \u003d ieee80211_rx_bss_get(dev, bssid,\n\t\t\t\t\tlocal-\u003ehw.conf.channel-\u003ecenter_freq,\n\t\t\t\t\tifsta-\u003essid, ifsta-\u003essid_len)))\n\nNote:\nIn general disconnection is still not handled properly in mac80211\n\nSigned-off-by: Assaf Krauss \u003cassaf.krauss@intel.com\u003e\nSigned-off-by: Tomas Winkler \u003ctomas.winkler@intel.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "507b06d0622480f8026d49a94f86068bb0fd6ed6",
      "tree": "40b99e2532dbfd4dba4e705c6cc6b2fc6e60d8aa",
      "parents": [
        "ea177305b321a4127e448b88de20d5792682ace1"
      ],
      "author": {
        "name": "Dan Williams",
        "email": "dcbw@redhat.com",
        "time": "Tue Jun 03 23:39:55 2008 -0400"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Jun 09 15:50:19 2008 -0400"
      },
      "message": "mac80211: send association event on IBSS create\n\nOtherwise userspace has no idea the IBSS creation succeeded.\n\nSigned-off-by: Dan Williams \u003cdcbw@redhat.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "ddb2c43594f22843e9f3153da151deaba1a834c5",
      "tree": "7eeeca2fa55e9ef45c381b01d9e3ec1b726297c1",
      "parents": [
        "efedf51c866130945b5db755cb58670e60205d83"
      ],
      "author": {
        "name": "Chris Wright",
        "email": "chrisw@sous-sol.org",
        "time": "Wed Jun 04 09:16:33 2008 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Jun 05 14:24:54 2008 -0700"
      },
      "message": "asn1: additional sanity checking during BER decoding\n\n- Don\u0027t trust a length which is greater than the working buffer.\n  An invalid length could cause overflow when calculating buffer size\n  for decoding oid.\n\n- An oid length of zero is invalid and allows for an off-by-one error when\n  decoding oid because the first subid actually encodes first 2 subids.\n\n- A primitive encoding may not have an indefinite length.\n\nThanks to Wei Wang from McAfee for report.\n\nCc: Steven French \u003csfrench@us.ibm.com\u003e\nCc: stable@kernel.org\nAcked-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: Chris Wright \u003cchrisw@sous-sol.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "3e387fcdc485d94fe2c4b52e7c30c0c4cd1fe364",
      "tree": "577de7b1aed18106b30e3e1d517b165f137e52ac",
      "parents": [
        "9489a0625854cd7482bb0e8b37de4406cdcd49e0",
        "24b95685ffcdb3dc28f64b9e8af6ea3e8360fbc5"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Jun 04 17:39:33 2008 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Jun 04 17:39:33 2008 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (56 commits)\n  l2tp: Fix possible oops if transmitting or receiving when tunnel goes down\n  tcp: Fix for race due to temporary drop of the socket lock in skb_splice_bits.\n  tcp: Increment OUTRSTS in tcp_send_active_reset()\n  raw: Raw socket leak.\n  lt2p: Fix possible WARN_ON from socket code when UDP socket is closed\n  USB ID for Philips CPWUA054/00 Wireless USB Adapter 11g\n  ssb: Fix context assertion in ssb_pcicore_dev_irqvecs_enable\n  libertas: fix command size for CMD_802_11_SUBSCRIBE_EVENT\n  ipw2200: expire and use oldest BSS on adhoc create\n  airo warning fix\n  b43legacy: Fix controller restart crash\n  sctp: Fix ECN markings for IPv6\n  sctp: Flush the queue only once during fast retransmit.\n  sctp: Start T3-RTX timer when fast retransmitting lowest TSN\n  sctp: Correctly implement Fast Recovery cwnd manipulations.\n  sctp: Move sctp_v4_dst_saddr out of loop\n  sctp: retran_path update bug fix\n  tcp: fix skb vs fack_count out-of-sync condition\n  sunhme: Cleanup use of deprecated calls to save_and_cli and restore_flags.\n  xfrm: xfrm_algo: correct usage of RIPEMD-160\n  ...\n"
    },
    {
      "commit": "293ad60401da621b8b329abbe8c388edb25f658a",
      "tree": "fb2fdaf7721c8efa36b0b47f7b63d4e600217dbb",
      "parents": [
        "26af65cbeb2467a486ae4fc7242c94e470c67c50"
      ],
      "author": {
        "name": "Octavian Purdila",
        "email": "opurdila@ixiacom.com",
        "time": "Wed Jun 04 15:45:58 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 15:45:58 2008 -0700"
      },
      "message": "tcp: Fix for race due to temporary drop of the socket lock in skb_splice_bits.\n\nskb_splice_bits temporary drops the socket lock while iterating over\nthe socket queue in order to break a reverse locking condition which\nhappens with sendfile. This, however, opens a window of opportunity\nfor tcp_collapse() to aggregate skbs and thus potentially free the\ncurrent skb used in skb_splice_bits and tcp_read_sock.\n\nThis patch fixes the problem by (re-)getting the same \"logical skb\"\nafter the lock has been temporary dropped.\n\nBased on idea and initial patch from Evgeniy Polyakov.\n\nSigned-off-by: Octavian Purdila \u003copurdila@ixiacom.com\u003e\nAcked-by: Evgeniy Polyakov \u003cjohnpol@2ka.mipt.ru\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "26af65cbeb2467a486ae4fc7242c94e470c67c50",
      "tree": "24053b1e17e1629229ab03fc410b40f5df0d16b8",
      "parents": [
        "22dd485022f3d0b162ceb5e67d85de7c3806aa20"
      ],
      "author": {
        "name": "Sridhar Samudrala",
        "email": "sri@us.ibm.com",
        "time": "Wed Jun 04 15:19:35 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 15:19:35 2008 -0700"
      },
      "message": "tcp: Increment OUTRSTS in tcp_send_active_reset()\n\nTCP \"resets sent\" counter is not incremented when a TCP Reset is \nsent via tcp_send_active_reset().\n\nSigned-off-by: Sridhar Samudrala \u003csri@us.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "22dd485022f3d0b162ceb5e67d85de7c3806aa20",
      "tree": "b96ff526ef0e7fe161eecdaa9edf999e3c3a4791",
      "parents": [
        "199f7d24ae59894243687a234a909f44a8724506"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Wed Jun 04 15:16:12 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 15:16:12 2008 -0700"
      },
      "message": "raw: Raw socket leak.\n\nThe program below just leaks the raw kernel socket\n\nint main() {\n        int fd \u003d socket(PF_INET, SOCK_RAW, IPPROTO_UDP);\n        struct sockaddr_in addr;\n\n        memset(\u0026addr, 0, sizeof(addr));\n        inet_aton(\"127.0.0.1\", \u0026addr.sin_addr);\n        addr.sin_family \u003d AF_INET;\n        addr.sin_port \u003d htons(2048);\n        sendto(fd,  \"a\", 1, MSG_MORE, \u0026addr, sizeof(addr));\n        return 0;\n}\n\nCorked packet is allocated via sock_wmalloc which holds the owner socket,\nso one should uncork it and flush all pending data on close. Do this in the\nsame way as in UDP.\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nAcked-by: Alexey Kuznetsov \u003ckuznet@ms2.inr.ac.ru\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b9031d9d87b24e24cd32ea15b5f4220a1e8da909",
      "tree": "9033b439bfead85c115f9952fc060424788e8759",
      "parents": [
        "8b750ce54bd8ab5f75d519ee450e1b0c5226ebe9"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Wed Jun 04 12:40:15 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 12:40:15 2008 -0700"
      },
      "message": "sctp: Fix ECN markings for IPv6\n\nCommit e9df2e8fd8fbc95c57dbd1d33dada66c4627b44c (\"[IPV6]: Use\nappropriate sock tclass setting for routing lookup.\") also changed the\nway that ECN capable transports mark this capability in IPv6.  As a\nresult, SCTP was not marking ECN capablity because the traffic class\nwas never set.  This patch brings back the markings for IPv6 traffic.\n\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8b750ce54bd8ab5f75d519ee450e1b0c5226ebe9",
      "tree": "f9097fce144eb4646f5cdb1ac66e3b7f0f4c5a55",
      "parents": [
        "62aeaff5ccd96462b7077046357a6d7886175a57"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Wed Jun 04 12:39:36 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 12:39:36 2008 -0700"
      },
      "message": "sctp: Flush the queue only once during fast retransmit.\n\nWhen fast retransmit is triggered by a sack, we should flush the queue\nonly once so that only 1 retransmit happens.  Also, since we could\npotentially have non-fast-rtx chunks on the retransmit queue, we need\nmake sure any chunks eligable for fast retransmit are sent first\nduring fast retransmission.\n\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nTested-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "62aeaff5ccd96462b7077046357a6d7886175a57",
      "tree": "8ea18997997a8724222c86f659b559e12bcf4a86",
      "parents": [
        "a6465234814efda9ed1dccdba852953f7508e827"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Wed Jun 04 12:39:11 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 12:39:11 2008 -0700"
      },
      "message": "sctp: Start T3-RTX timer when fast retransmitting lowest TSN\n\nWhen we are trying to fast retransmit the lowest outstanding TSN, we\nneed to restart the T3-RTX timer, so that subsequent timeouts will\ncorrectly tag all the packets necessary for retransmissions.\n\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nTested-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a6465234814efda9ed1dccdba852953f7508e827",
      "tree": "d2aa1f6c5776b0bd85a1ae9652ab47b18a4ba744",
      "parents": [
        "159c6bea37c54dfae44409467e0f17600722d541"
      ],
      "author": {
        "name": "Vlad Yasevich",
        "email": "vladislav.yasevich@hp.com",
        "time": "Wed Jun 04 12:38:43 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 12:38:43 2008 -0700"
      },
      "message": "sctp: Correctly implement Fast Recovery cwnd manipulations.\n\nCorrectly keep track of Fast Recovery state and do not reduce\ncongestion window multiple times during sucht state.\n\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nTested-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "159c6bea37c54dfae44409467e0f17600722d541",
      "tree": "ddac63124db30839630ca46d55688fd8cef3f1f1",
      "parents": [
        "4141ddc02a92a6e3e5793601554c6033e83c25b9"
      ],
      "author": {
        "name": "Gui Jianfeng",
        "email": "guijianfeng@cn.fujitsu.com",
        "time": "Wed Jun 04 12:38:07 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 12:38:07 2008 -0700"
      },
      "message": "sctp: Move sctp_v4_dst_saddr out of loop\n\nThere\u0027s no need to execute sctp_v4_dst_saddr() for each\niteration, just move it out of loop.\n\nSigned-off-by: Gui Jianfeng \u003cguijianfeng@cn.fujitsu.com\u003e\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4141ddc02a92a6e3e5793601554c6033e83c25b9",
      "tree": "2edf77fb5f0b021692e15dafe3660d13c7c637cd",
      "parents": [
        "aed5a833fb18123d7cfc6ce3810ab97efd4869b3"
      ],
      "author": {
        "name": "Gui Jianfeng",
        "email": "guijianfeng@cn.fujitsu.com",
        "time": "Wed Jun 04 12:37:33 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 12:37:33 2008 -0700"
      },
      "message": "sctp: retran_path update bug fix\n\nIf the current retran_path is the only active one, it should\nupdate it to the the next inactive one.\n\nSigned-off-by: Gui Jianfeng \u003cguijianfeng@cn.fujitsu.com\u003e\nSigned-off-by: Vlad Yasevich \u003cvladislav.yasevich@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "aed5a833fb18123d7cfc6ce3810ab97efd4869b3",
      "tree": "7077b2dce8fe2990cdf10ef8e1990c1eeafd3bc1",
      "parents": [
        "a6604471db5e7a33474a7f16c64d6b118fae3e74",
        "9596cc826e2e52bfc318ca37a6c52fe3d72990a3"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 12:10:21 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 12:10:21 2008 -0700"
      },
      "message": "Merge branch \u0027net-2.6-misc-20080605a\u0027 of git://git.linux-ipv6.org/gitroot/yoshfuji/linux-2.6-fix\n"
    },
    {
      "commit": "a6604471db5e7a33474a7f16c64d6b118fae3e74",
      "tree": "fbfd7cd795bfd51ca11ca1a11ac80a749696b9d3",
      "parents": [
        "c03e05d81d70879273488206bfcb1805ebca9612"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Wed Jun 04 12:07:44 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 12:07:44 2008 -0700"
      },
      "message": "tcp: fix skb vs fack_count out-of-sync condition\n\nThis bug is able to corrupt fackets_out in very rare cases.\nIn order for this to cause corruption:\n  1) DSACK in the middle of previous SACK block must be generated.\n  2) In order to take that particular branch, part or all of the\n     DSACKed segment must already be SACKed so that we have that\n     in cache in the first place.\n  3) The new info must be top enough so that fackets_out will be\n     updated on this iteration.\n...then fack_count is updated while skb wasn\u0027t, then we walk again\nthat particular segment thus updating fack_count twice for\na single skb and finally that value is assigned to fackets_out\nby tcp_sacktag_one.\n\nIt is safe to call tcp_sacktag_one just once for a segment (at\nDSACK), no need to call again for plain SACK.\n\nPotential problem of the miscount are limited to premature entry\nto recovery and to inflated reordering metric (which could even\ncancel each other out in the most the luckiest scenarios :-)).\nBoth are quite insignificant in worst case too and there exists\nalso code to reset them (fackets_out once sacked_out becomes zero\nand reordering metric on RTO).\n\nThis has been reported by a number of people, because it occurred\nquite rarely, it has been very evasive. Andy Furniss was able to\nget it to occur couple of times so that a bit more info was\ncollected about the problem using a debug patch, though it still\nrequired lot of checking around. Thanks also to others who have\ntried to help here.\n\nThis is listed as Bugzilla #10346. The bug was introduced by\nme in commit 68f8353b48 ([TCP]: Rewrite SACK block processing \u0026 \nsack_recv_cache use), I probably thought back then that there\u0027s\nneed to scan that entry twice or didn\u0027t dare to make it go\nthrough it just once there. Going through twice would have\nrequired restoring fack_count after the walk but as noted above,\nI chose to drop the additional walk step altogether here.\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a13366c632132bb9f8f2950a79773d8f68f4871e",
      "tree": "b9d9414236087dd7d0ea818141e9b41feecff6cc",
      "parents": [
        "8b91ac09732895f928ed6107bda5318cf260520b"
      ],
      "author": {
        "name": "Adrian-Ken Rueegsegger",
        "email": "rueegsegger@swiss-it.ch",
        "time": "Wed Jun 04 12:04:55 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 12:04:55 2008 -0700"
      },
      "message": "xfrm: xfrm_algo: correct usage of RIPEMD-160\n\nThis patch fixes the usage of RIPEMD-160 in xfrm_algo which in turn\nallows hmac(rmd160) to be used as authentication mechanism in IPsec\nESP and AH (see RFC 2857).\n\nSigned-off-by: Adrian-Ken Rueegsegger \u003crueegsegger@swiss-it.ch\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9596cc826e2e52bfc318ca37a6c52fe3d72990a3",
      "tree": "b534c55ef8f13182d3627b73ac52d432bebf8016",
      "parents": [
        "36d926b94a9908937593e5669162305a071b9cc3"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Wed Jun 04 15:49:08 2008 +0400"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 05 04:02:38 2008 +0900"
      },
      "message": "[IPV6]: Do not change protocol for UDPv6 sockets with pending sent data.\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "36d926b94a9908937593e5669162305a071b9cc3",
      "tree": "c298f82a8d8b87ab4ebf7b514b394763889108b0",
      "parents": [
        "49d074f4009a7b5ce9c17b040f978abcb4d7f6f6"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Wed Jun 04 15:49:07 2008 +0400"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 05 04:02:38 2008 +0900"
      },
      "message": "[IPV6]: inet_sk(sk)-\u003ecork.opt leak\n\nIPv6 UDP sockets wth IPv4 mapped address use udp_sendmsg to send the data\nactually. In this case ip_flush_pending_frames should be called instead\nof ip6_flush_pending_frames.\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "49d074f4009a7b5ce9c17b040f978abcb4d7f6f6",
      "tree": "dde9d84731f79fc717df60e316ecae1b7b750bdb",
      "parents": [
        "91e1908f569dd96a25a3947de8771e6cc93999dd"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Wed Jun 04 15:49:06 2008 +0400"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 05 04:02:37 2008 +0900"
      },
      "message": "[IPV6]: Do not change protocol for raw IPv6 sockets.\n\nIt is not allowed to change underlying protocol for\n   int fd \u003d socket(PF_INET6, SOCK_RAW, IPPROTO_UDP);\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "91e1908f569dd96a25a3947de8771e6cc93999dd",
      "tree": "552e4ac3dfc4aa0ba3ce8d2a329fb55d4fac72af",
      "parents": [
        "187e38384c4abfbbb1b880fab234d16c2df23a25"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Wed Jun 04 13:02:49 2008 +0900"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 05 04:02:36 2008 +0900"
      },
      "message": "[IPV6] NETNS: Handle ancillary data in appropriate namespace.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "187e38384c4abfbbb1b880fab234d16c2df23a25",
      "tree": "a4d30e1dbb437dc6c09c09083b040f5534002c6e",
      "parents": [
        "95b496b66615d8c43f77702049b1bd01e2f06595"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Wed Jun 04 13:01:37 2008 +0900"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 05 04:02:35 2008 +0900"
      },
      "message": "[IPV6]: Check outgoing interface even if source address is unspecified.\n\nThe outgoing interface index (ipi6_ifindex) in IPV6_PKTINFO\nancillary data, is not checked if the source address (ipi6_addr)\nis unspecified.  If the ipi6_ifindex is the not-exist interface,\nit should be fail.\n\nBased on patch from Shan Wei \u003cshanwei@cn.fujitsu.com\u003e and\nBrian Haley \u003cbrian.haley@hp.com\u003e.\n\nSigned-off-by: Shan Wei \u003cshanwei@cn.fujitsu.com\u003e\nSigned-off-by: Brian Haley \u003cbrian.haley@hp.com\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "95b496b66615d8c43f77702049b1bd01e2f06595",
      "tree": "5e0dc14f6bb3f13b6446fef52916ed3a07dca12b",
      "parents": [
        "05335c2220c4911b69cb1bdd79e603ab08088372"
      ],
      "author": {
        "name": "Yang Hongyang",
        "email": "yanghy@cn.fujitsu.com",
        "time": "Wed May 28 16:27:28 2008 +0800"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 05 04:02:35 2008 +0900"
      },
      "message": "[IPV6]: Fix the data length of get destination options with short length\n\n If get destination options with length which is not enough for that\noption,getsockopt() will still return the real length of the option,\nwhich is larger then the buffer space.\n This is because ipv6_getsockopt_sticky() returns the real length of\nthe option.\n\nThis patch fix this problem.\n\nSigned-off-by: Yang Hongyang \u003cyanghy@cn.fujitsu.com\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "05335c2220c4911b69cb1bdd79e603ab08088372",
      "tree": "fadca5b01e5029eaef277f691c9f4d78a54c0bad",
      "parents": [
        "4bed72e4f5502ea3322f0a00794815fa58951abe"
      ],
      "author": {
        "name": "Yang Hongyang",
        "email": "yanghy@cn.fujitsu.com",
        "time": "Wed May 28 16:23:47 2008 +0800"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 05 04:02:34 2008 +0900"
      },
      "message": "[IPV6]: Fix the return value of get destination options with NULL data pointer\n\nIf we pass NULL data buffer to getsockopt(), it will return 0,\nand the option length is set to -EFAULT:\n    getsockopt(sk, IPPROTO_IPV6, IPV6_DSTOPTS, NULL, \u0026len);\n\nThis is because ipv6_getsockopt_sticky() will return -EFAULT or\n-EINVAL if some error occur.\n\nThis patch fix this problem.\n\nSigned-off-by: Yang Hongyang \u003cyanghy@cn.fujitsu.com\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "4bed72e4f5502ea3322f0a00794815fa58951abe",
      "tree": "fd652d01822746a84d5812bbe2ee0661fbd3b86f",
      "parents": [
        "baa2bfb8aef24bb7fe1875b256918724b3884662"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Tue May 27 17:37:49 2008 +0900"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 05 04:02:34 2008 +0900"
      },
      "message": "[IPV6] ADDRCONF: Allow longer lifetime on 64bit archs.\n\n- Allow longer lifetimes (\u003e\u003d 0x7fffffff/HZ) on 64bit archs\n  by using unsigned long.\n- Shadow this arithmetic overflow workaround by introducing\n  helper functions: addrconf_timeout_fixup() and\n  addrconf_finite_timeout().\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "baa2bfb8aef24bb7fe1875b256918724b3884662",
      "tree": "03d94dc1da25b83f5aa734a6730d26554812ee77",
      "parents": [
        "82836372311a5cbf9cc5f4f47f9b56cb9edfe90d"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Fri May 30 11:35:03 2008 +0900"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 05 04:02:33 2008 +0900"
      },
      "message": "[IPV4] TUNNEL4: Fix incoming packet length check for inter-protocol tunnel.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "82836372311a5cbf9cc5f4f47f9b56cb9edfe90d",
      "tree": "214a64dbce626d2a95893d1cd75d8ab27b6a8601",
      "parents": [
        "24ef0da7b864435f221f668bc8a324160d063e78"
      ],
      "author": {
        "name": "Colin",
        "email": "colins@sjtu.edu.cn",
        "time": "Tue May 27 00:04:43 2008 +0800"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 05 04:02:32 2008 +0900"
      },
      "message": "[IPV6] TUNNEL6: Fix incoming packet length check for inter-protocol tunnel.\n\nI discover a strange behavior in [ipv4 in ipv6] tunnel. When IPv6 tunnel\npayload is less than 40(0x28), packet can be sent to network, received in\nphysical interface, but not seen in IP tunnel interface. No counter increase\nin tunnel interface.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "24ef0da7b864435f221f668bc8a324160d063e78",
      "tree": "766e3dffc0e878bf07e4d9a4aa0b25b19d8e2785",
      "parents": [
        "a3c960899e042bc1c2b730a2115fa32da7802039"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed May 28 16:54:22 2008 +0200"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 05 04:02:31 2008 +0900"
      },
      "message": "[IPV6] ADDRCONF: Check range of prefix length\n\nAs of now, the prefix length is not vaildated when adding or deleting\naddresses. The value is passed directly into the inet6_ifaddr structure\nand later passed on to memcmp() as length indicator which relies on\nthe value never to exceed 128 (bits).\n\nDue to the missing check, the currently code allows for any 8 bit\nvalue to be passed on as prefix length while using the netlink\ninterface, and any 32 bit value while using the ioctl interface.\n\n[Use unsigned int instead to generate better code - yoshfuji]\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "a3c960899e042bc1c2b730a2115fa32da7802039",
      "tree": "d12d8270414bc113b0ae5b7ffc0d23096b30e193",
      "parents": [
        "e51171019bb0e1f9fb57c25bd2e38ce652eaea27"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Wed Jun 04 01:30:25 2008 +0900"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 05 04:02:31 2008 +0900"
      },
      "message": "[IPV6] UDP: Possible dst leak in udpv6_sendmsg.\n\nip6_sk_dst_lookup returns held dst entry. It should be released\non all paths beyond this point. Add missed release when up-\u003epending\nis set.\n\nBug report and initial patch by Denis V. Lunev \u003cden@openvz.org\u003e.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nAcked-by: Denis V. Lunev \u003cden@openvz.org\u003e\n"
    },
    {
      "commit": "e51171019bb0e1f9fb57c25bd2e38ce652eaea27",
      "tree": "6adf7c9e23c54de5a2b361c8e59d692a29e7541e",
      "parents": [
        "7dccf1f4e1696c79bff064c3770867cc53cbc71c"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu May 29 19:55:05 2008 +0900"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jun 05 04:02:30 2008 +0900"
      },
      "message": "[SCTP]: Fix NULL dereference of asoc.\n\nCommit 7cbca67c073263c179f605bdbbdc565ab29d801d (\"[IPV6]: Support\nSource Address Selection API (RFC5014)\") introduced NULL dereference\nof asoc to sctp_v6_get_saddr in net/sctp/ipv6.c.\nPointed out by Johann Felix Soden \u003cjohfel@users.sourceforge.net\u003e.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "8aca6cb1179ed9bef9351028c8d8af852903eae2",
      "tree": "4a2243d41b625872381e86fbb8e72eddd3d078df",
      "parents": [
        "b9c698964614f71b9c8afeca163a945b4c2e2d20"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Wed Jun 04 11:34:22 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 11:34:22 2008 -0700"
      },
      "message": "tcp: Fix inconsistency source (CA_Open only when !tcp_left_out(tp))\n\nIt is possible that this skip path causes TCP to end up into an\ninvalid state where ca_state was left to CA_Open while some\nsegments already came into sacked_out. If next valid ACK doesn\u0027t\ncontain new SACK information TCP fails to enter into\ntcp_fastretrans_alert(). Thus at least high_seq is set\nincorrectly to a too high seqno because some new data segments\ncould be sent in between (and also, limited transmit is not\nbeing correctly invoked there). Reordering in both directions\ncan easily cause this situation to occur.\n\nI guess we would want to use tcp_moderate_cwnd(tp) there as well\nas it may be possible to use this to trigger oversized burst to\nnetwork by sending an old ACK with huge amount of SACK info, but\nI\u0027m a bit unsure about its effects (mainly to FlightSize), so to\nbe on the safe side I just currently fixed it minimally to keep\nTCP\u0027s state consistent (obviously, such nasty ACKs have been\npossible this far). Though it seems that FlightSize is already\nunderestimated by some amount, so probably on the long term we\nmight want to trigger recovery there too, if appropriate, to make\nFlightSize calculation to resemble reality at the time when the\nlosses where discovered (but such change scares me too much now\nand requires some more thinking anyway how to do that as it\nlikely involves some code shuffling).\n\nThis bug was found by Brian Vowell while running my TCP debug\npatch to find cause of another TCP issue (fackets_out\nmiscount).\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b9c698964614f71b9c8afeca163a945b4c2e2d20",
      "tree": "f70242a7796aae3b648efcd46cf60e18f1724bac",
      "parents": [
        "d2ee3f2c4b1db1320c1efb4dcaceeaf6c7e6c2d3"
      ],
      "author": {
        "name": "Jarek Poplawski",
        "email": "jarkao2@gmail.com",
        "time": "Wed Jun 04 09:58:27 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 09:58:27 2008 -0700"
      },
      "message": "netfilter: nf_conntrack_ipv6: fix inconsistent lock state in nf_ct_frag6_gather()\n\n[   63.531438] \u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n[   63.531520] [ INFO: inconsistent lock state ]\n[   63.531520] 2.6.26-rc4 #7\n[   63.531520] ---------------------------------\n[   63.531520] inconsistent {softirq-on-W} -\u003e {in-softirq-W} usage.\n[   63.531520] tcpsic6/3864 [HC0[0]:SC1[1]:HE1:SE0] takes:\n[   63.531520]  (\u0026q-\u003elock#2){-+..}, at: [\u003cc07175b0\u003e] ipv6_frag_rcv+0xd0/0xbd0\n[   63.531520] {softirq-on-W} state was registered at:\n[   63.531520]   [\u003cc0143bba\u003e] __lock_acquire+0x3aa/0x1080\n[   63.531520]   [\u003cc0144906\u003e] lock_acquire+0x76/0xa0\n[   63.531520]   [\u003cc07a8f0b\u003e] _spin_lock+0x2b/0x40\n[   63.531520]   [\u003cc0727636\u003e] nf_ct_frag6_gather+0x3f6/0x910\n ...\n\nAccording to this and another similar lockdep report inet_fragment\nlocks are taken from nf_ct_frag6_gather() with softirqs enabled, but\nthese locks are mainly used in softirq context, so disabling BHs is\nnecessary.\n\nReported-and-tested-by: Eric Sesterhenn \u003csnakebyte@gmx.de\u003e\nSigned-off-by: Jarek Poplawski \u003cjarkao2@gmail.com\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d2ee3f2c4b1db1320c1efb4dcaceeaf6c7e6c2d3",
      "tree": "081c903c68a0df98f0ac1f3a73f480d801af0689",
      "parents": [
        "ab32cd793dca21eec846a8204390d9594ed994d5"
      ],
      "author": {
        "name": "Dong Wei",
        "email": "dwei.zh@gmail.com",
        "time": "Wed Jun 04 09:57:51 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 09:57:51 2008 -0700"
      },
      "message": "netfilter: xt_connlimit: fix accouning when receive RST packet in ESTABLISHED state\n\nIn xt_connlimit match module, the counter of an IP is decreased when\nthe TCP packet is go through the chain with ip_conntrack state TW.\nWell, it\u0027s very natural that the server and client close the socket\nwith FIN packet. But when the client/server close the socket with RST\npacket(using so_linger), the counter for this connection still exsit.\nThe following patch can fix it which is based on linux-2.6.25.4\n\nSigned-off-by: Dong Wei \u003cdwei.zh@gmail.com\u003e\nAcked-by: Jan Engelhardt \u003cjengelh@medozas.de\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d430a227d272fa514bade388bf511dba4ec2962a",
      "tree": "bcf633298ce9740f4c0f38278f3006d634da98eb",
      "parents": [
        "c409d52bd1f16b37d35a50162cbf6401011f1135"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@ftp.linux.org.uk",
        "time": "Mon Jun 02 10:59:02 2008 +0100"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Jun 04 08:06:02 2008 -0700"
      },
      "message": "bogus format in ip6mr\n\nptrdiff_t is %t..., not %Z...\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "ab32cd793dca21eec846a8204390d9594ed994d5",
      "tree": "ed3c2d053ed6206ad7e440c0a20982d6266e1df5",
      "parents": [
        "bc3ed28caaef55e7e3a9316464256353c5f9b1df"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Tue Jun 03 16:37:33 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jun 03 16:37:33 2008 -0700"
      },
      "message": "route: Remove unused ifa_anycast field\n\nThe field was supposed to allow the creation of an anycast route by\nassigning an anycast address to an address prefix. It was never\nimplemented so this field is unused and serves no purpose. Remove it.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "bc3ed28caaef55e7e3a9316464256353c5f9b1df",
      "tree": "3aed4521aa2d74a36ee2b192c2e229fd23fbe732",
      "parents": [
        "1f9d11c7c99da706e33646c3a9080dd5a8ef9a0b"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Tue Jun 03 16:36:54 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jun 03 16:36:54 2008 -0700"
      },
      "message": "netlink: Improve returned error codes\n\nMake nlmsg_trim(), nlmsg_cancel(), genlmsg_cancel(), and\nnla_nest_cancel() void functions.\n\nReturn -EMSGSIZE instead of -1 if the provided message buffer is not\nbig enough.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1f9d11c7c99da706e33646c3a9080dd5a8ef9a0b",
      "tree": "afd44a0780cace76bab90a48a9ba89ee4dfb6684",
      "parents": [
        "51b77cae0d5aa8e1546fca855dcfe48ddfadfa9c"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Tue Jun 03 16:36:27 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jun 03 16:36:27 2008 -0700"
      },
      "message": "route: Mark unused routing attributes as such\n\nAlso removes an unused policy entry for an attribute which is\nonly used in kernel-\u003euser direction.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "51b77cae0d5aa8e1546fca855dcfe48ddfadfa9c",
      "tree": "5d6824e94b09784b6b41f39ca08e11844bc73c7b",
      "parents": [
        "7557af25155a82ac2dad73eec6b0166868bf8ea2"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Tue Jun 03 16:36:01 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jun 03 16:36:01 2008 -0700"
      },
      "message": "route: Mark unused route cache flags as such.\n\nAlso removes an obsolete check for the unused flag RTCF_MASQ.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7557af25155a82ac2dad73eec6b0166868bf8ea2",
      "tree": "6e9ac27f3e167823379e3c84b3cac21d71b00661",
      "parents": [
        "b9f5f52cca3e94f1e7509f366aa250ebbe1ed0b5"
      ],
      "author": {
        "name": "Brice Goglin",
        "email": "Brice.Goglin@inria.fr",
        "time": "Tue Jun 03 16:07:45 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jun 03 16:07:45 2008 -0700"
      },
      "message": "net_dma: remove duplicate assignment in dma_skb_copy_datagram_iovec\n\nNo need to compute copy twice in the frags loop in\ndma_skb_copy_datagram_iovec().\n\nSigned-off-by: Brice Goglin \u003cBrice.Goglin@inria.fr\u003e\nAcked-by: Shannon Nelson \u003cshannon.nelson@intel.com\u003e\nSigned-off-by: Maciej Sosnowski \u003cmaciej.sosnowski@intel.com\u003e\nSigned-off-by: Dan Williams \u003cdan.j.williams@intel.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b9f5f52cca3e94f1e7509f366aa250ebbe1ed0b5",
      "tree": "539f26976e4f44f24d230357de75772ae5a4df3b",
      "parents": [
        "57c511d8d47caeeae375cb8106662c0bd6a7e7e0"
      ],
      "author": {
        "name": "Stephen Hemminger",
        "email": "shemminger@vyatta.com",
        "time": "Tue Jun 03 16:03:15 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jun 03 16:03:15 2008 -0700"
      },
      "message": "net: neighbour table ABI problem\n\nThe neighbor table time of last use information is returned in the\nincorrect unit. Kernel to user space ABI\u0027s need to use USER_HZ (or\nmilliseconds), otherwise the application has to try and discover the\nreal system HZ value which is problematic.  Linux has standardized on\nkeeping USER_HZ consistent (100hz) even when kernel is running\ninternally at some other value.\n\nThis change is small, but it breaks the ABI for older version of\niproute2 utilities.  But these utilities are already broken since they\nare looking at the psched_hz values which are completely different. So\nlet\u0027s just go ahead and fix both kernel and user space. Older\nutilities will just print wrong values.\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n\n"
    },
    {
      "commit": "9ecad877948deb2871d29e03786a7d7911687009",
      "tree": "d54d027469630aa3b3cd4334b41dd3bc42e50871",
      "parents": [
        "7dccf1f4e1696c79bff064c3770867cc53cbc71c"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Tue Jun 03 15:18:36 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jun 03 15:18:36 2008 -0700"
      },
      "message": "irda: Sock leak on error path in irda_create.\n\nBad type/protocol specified result in sk leak.\n\nFix is simple - release the sk if bad values are given,\nbut to make it possible just to call sk_free(), I move\nsome sk initialization a bit lower.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7dccf1f4e1696c79bff064c3770867cc53cbc71c",
      "tree": "42c7c3b152d02345d41f9253bebb0dd12c23e4ce",
      "parents": [
        "537d59af73d894750cff14f90fe2b6d77fbab15b"
      ],
      "author": {
        "name": "Jarek Poplawski",
        "email": "jarkao2@gmail.com",
        "time": "Tue Jun 03 14:53:46 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jun 03 14:53:46 2008 -0700"
      },
      "message": "ax25: Fix NULL pointer dereference and lockup.\n\nFrom: Jarek Poplawski \u003cjarkao2@gmail.com\u003e\n\nThere is only one function in AX25 calling skb_append(), and it really\nlooks suspicious: appends skb after previously enqueued one, but in\nthe meantime this previous skb could be removed from the queue.\n\nThis patch Fixes it the simple way, so this is not fully compatible with\nthe current method, but testing hasn\u0027t shown any problems.\n\nSigned-off-by: Ralf Baechle \u003cralf@linux-mips.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "537d59af73d894750cff14f90fe2b6d77fbab15b",
      "tree": "bff5d6efbffbf6685cac5698efe7e3192e391047",
      "parents": [
        "c3b25b32e8bef526cca748e1ba023c6bdd705a99"
      ],
      "author": {
        "name": "Dave Young",
        "email": "hidave.darkstar@gmail.com",
        "time": "Sun Jun 01 23:50:52 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jun 03 14:27:17 2008 -0700"
      },
      "message": "bluetooth: rfcomm_dev_state_change deadlock fix\n\nThere\u0027s logic in __rfcomm_dlc_close:\n\trfcomm_dlc_lock(d);\n\td-\u003estate \u003d BT_CLOSED;\n\td-\u003estate_changed(d, err);\n\trfcomm_dlc_unlock(d);\n\nIn rfcomm_dev_state_change, it\u0027s possible that rfcomm_dev_put try to\ntake the dlc lock, then we will deadlock.\n\nHere fixed it by unlock dlc before rfcomm_dev_get in\nrfcomm_dev_state_change.\n\nwhy not unlock just before rfcomm_dev_put? it\u0027s because there\u0027s\nanother problem.  rfcomm_dev_get/rfcomm_dev_del will take\nrfcomm_dev_lock, but in rfcomm_dev_add the lock order is :\nrfcomm_dev_lock --\u003e dlc lock\n\nso I unlock dlc before the taken of rfcomm_dev_lock.\n\nActually it\u0027s a regression caused by commit\n1905f6c736cb618e07eca0c96e60e3c024023428 (\"bluetooth :\n__rfcomm_dlc_close lock fix\"), the dlc state_change could be two\ncallbacks : rfcomm_sk_state_change and rfcomm_dev_state_change. I\nmissed the rfcomm_sk_state_change that time.\n\nThanks Arjan van de Ven \u003carjan@linux.intel.com\u003e for the effort in\ncommit 4c8411f8c115def968820a4df6658ccfd55d7f1a (\"bluetooth: fix\nlocking bug in the rfcomm socket cleanup handling\") but he missed the\nrfcomm_dev_state_change lock issue.\n\nSigned-off-by: Dave Young \u003chidave.darkstar@gmail.com\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1beee8dc8cf58e3f605bd7b34d7a39939be7d8d2",
      "tree": "85183db61290ef9e8e1c25d7ffb9d8d53acb1766",
      "parents": [
        "9db8ee3d96e98705ba4e9260815ca326b0d07741",
        "3446b9d57edd0b96a89715fef222879e4919a115"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri May 30 07:45:20 2008 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri May 30 07:45:20 2008 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (26 commits)\n  llc: Fix double accounting of received packets\n  netfilter: nf_conntrack_expect: fix error path unwind in nf_conntrack_expect_init()\n  bluetooth: fix locking bug in the rfcomm socket cleanup handling\n  mac80211: fix alignment issue with compare_ether_addr()\n  mac80211: Fix for NULL pointer dereference in sta_info_get()\n  mac80211: fix a typo in ieee80211_handle_filtered_frame comment\n  rndis_wlan: add missing range check for power_output modparam\n  iwlwifi: fix rate scale TLC column selection bug\n  iwlwifi: fix exit from stay_in_table state\n  rndis_wlan: Make connections to TKIP PSK networks work\n  mac80211 : Fixes the status message for iwconfig\n  rt2x00: Use atomic interface iteration in irq context\n  rt2x00: Reset antenna RSSI after switch\n  rt2x00: Don\u0027t count retries as failure\n  rt2x00: Fix memleak in tx() path\n  mac80211: reorder channel and freq reporting in wext scan report\n  b43: Fix controller restart crash\n  mac80211: fix ieee80211_rx_bss_put/get imbalance\n  net/mac80211: always true conditionals\n  b43: Upload both beacon templates on initial load\n  ...\n"
    },
    {
      "commit": "3446b9d57edd0b96a89715fef222879e4919a115",
      "tree": "ddf3a460069faba251a92bd1e2054b8db43d6c03",
      "parents": [
        "12293bf91126ad253a25e2840b307fdc7c2754c3"
      ],
      "author": {
        "name": "Arnaldo Carvalho de Melo",
        "email": "acme@redhat.com",
        "time": "Fri May 30 02:57:29 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri May 30 02:57:29 2008 -0700"
      },
      "message": "llc: Fix double accounting of received packets\n\nllc_sap_rcv was being preceded by skb_set_owner_r, then calling\nllc_state_process that calls sock_queue_rcv_skb, that in turn calls\nskb_set_owner_r again making the space allowed to be used by the socket to be\nleaked, making the socket to get stuck.\n\nFix it by setting skb-\u003esk at llc_sap_rcv and leave the accounting to be done\nonly at sock_queue_rcv_skb.\n\nReported-by: Dmitry Petukhov \u003cdmgenp@gmail.com\u003e\nTested-by: Dmitry Petukhov \u003cdmgenp@gmail.com\u003e\nSigned-off-by: Arnaldo Carvalho de Melo \u003cacme@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "12293bf91126ad253a25e2840b307fdc7c2754c3",
      "tree": "f936e8c39267398e77bc7ab71b63098ebd878e7c",
      "parents": [
        "8c3a01d0c259ec8b283c52dbeadda0122582a68b"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@parallels.com",
        "time": "Thu May 29 03:19:37 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu May 29 03:19:37 2008 -0700"
      },
      "message": "netfilter: nf_conntrack_expect: fix error path unwind in nf_conntrack_expect_init()\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@parallels.com\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8c3a01d0c259ec8b283c52dbeadda0122582a68b",
      "tree": "ebd17d756c14bf86a99185e88f73a7bba0544af9",
      "parents": [
        "4c8411f8c115def968820a4df6658ccfd55d7f1a",
        "c97c23e38625f59e3e9869664eeeb0cab1822948"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu May 29 01:49:04 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu May 29 01:49:04 2008 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of master.kernel.org:/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "4c8411f8c115def968820a4df6658ccfd55d7f1a",
      "tree": "4a2d592d9b41fabbd184ddaa7d2839f87f0a5ac9",
      "parents": [
        "825de27d9e40b3117b29a79d412b7a4b78c5d815"
      ],
      "author": {
        "name": "Arjan van de Ven",
        "email": "arjan@linux.intel.com",
        "time": "Thu May 29 01:32:47 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu May 29 01:32:47 2008 -0700"
      },
      "message": "bluetooth: fix locking bug in the rfcomm socket cleanup handling\n\nin net/bluetooth/rfcomm/sock.c, rfcomm_sk_state_change() does the\nfollowing operation:\n\n        if (parent \u0026\u0026 sock_flag(sk, SOCK_ZAPPED)) {\n                /* We have to drop DLC lock here, otherwise\n                 * rfcomm_sock_destruct() will dead lock. */\n                rfcomm_dlc_unlock(d);\n                rfcomm_sock_kill(sk);\n                rfcomm_dlc_lock(d);\n        }\n}\n\nwhich is fine, since rfcomm_sock_kill() will call sk_free() which will call\nrfcomm_sock_destruct() which takes the rfcomm_dlc_lock()... so far so good.\n\nHOWEVER, this assumes that the rfcomm_sk_state_change() function always gets\ncalled with the rfcomm_dlc_lock() taken. This is the case for all but one\ncase, and in that case where we don\u0027t have the lock, we do a double unlock\nfollowed by an attempt to take the lock, which due to underflow isn\u0027t\ngoing anywhere fast.\n\nThis patch fixes this by moving the stragling case inside the lock, like\nthe other usages of the same call are doing in this code.\n\nThis was found with the help of the www.kerneloops.org project, where this\ndeadlock was observed 51 times at this point in time:\nhttp://www.kerneloops.org/search.php?search\u003drfcomm_sock_destruct\n\nSigned-off-by: Arjan van de Ven \u003carjan@linux.intel.com\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c97c23e38625f59e3e9869664eeeb0cab1822948",
      "tree": "be2409534b84dcbf0b94271915aa5f65b203f7e8",
      "parents": [
        "70d251b24c44ab2fcba1807a5206e844cf10eb38"
      ],
      "author": {
        "name": "Senthil Balasubramanian",
        "email": "senthilkumar@atheros.com",
        "time": "Wed May 28 23:15:32 2008 +0530"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed May 28 16:43:50 2008 -0400"
      },
      "message": "mac80211: fix alignment issue with compare_ether_addr()\n\nThis addresses an alignment issue with compare_ether_addr().\nThe addresses passed to compare_ether_addr should be two bytes aligned.\nIt may function properly in x86 platform. However may not work properly\non IA-64 or ARM processor.\n\nThis also fixes a typo in mlme.c where the sk_buff struct name is incorect.\nThough sizeof() works for any incorrect structure pointer name as its just\na pointer length that we want, lets just fix it.\n\nSigned-off-by: Senthil Balasubramanian \u003csenthilkumar@atheros.com\u003e\nSigned-off-by: Luis R. Rodriguez \u003clrodriguez@atheros.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "70d251b24c44ab2fcba1807a5206e844cf10eb38",
      "tree": "37b16148cc305f874fcfaf0bd68e9463232061a8",
      "parents": [
        "f6d97104890203ba9c2cf8e34894c4c8e64cb880"
      ],
      "author": {
        "name": "Senthil Balasubramanian",
        "email": "senthilkumar@atheros.com",
        "time": "Wed May 28 20:08:12 2008 +0530"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed May 28 16:43:49 2008 -0400"
      },
      "message": "mac80211: Fix for NULL pointer dereference in sta_info_get()\n\nThis addresses a NULL pointer dereference in sta_info_get().\nTID and sta_info are extracted in ADDBA Timer expiry function\nthrough the timer handler\u0027s argument.\n\nThe problem is extracging the TID (which was stored in\ntimer_to_tid[] array of type \"u8\") through \"int *\" typecast which\nmay also yield unwanted bytes for the MSB of TID that results\nin incorrect sta_info and ieee80211_local pointers.\n\nieee80211_local pointer is NULL as illustrated below, it crashes in\nsta_info_get(). The problem started when extracting ieee80211_local\npointer out of sta_info iteself and eventually crashed in\nstat_info_get().\n\nThe proper way to fix is to change the data type of TID to u8\ninstead of u16. However changing all the occurences requires\nsome prototype changes as well. We should fix this in upcoming\npatches.\n\nSigned-off-by: Senthil Balasubramanian \u003csenthilkumar@atheros.com\u003e\nSigned-off-by: Luis Rodriguez \u003clrodriguez@atheros.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "f6d97104890203ba9c2cf8e34894c4c8e64cb880",
      "tree": "81860209157e3c650cb2057130daa99dac428b2f",
      "parents": [
        "a7624837261b55259d4a88309fd88529643fbb80"
      ],
      "author": {
        "name": "Yi Zhu",
        "email": "yi.zhu@intel.com",
        "time": "Tue May 27 17:50:50 2008 +0300"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed May 28 16:43:49 2008 -0400"
      },
      "message": "mac80211: fix a typo in ieee80211_handle_filtered_frame comment\n\nfix a typo in ieee80211_handle_filtered_frame comment\n\nSigned-off-by: Yi Zhu \u003cyi.zhu@intel.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "d4231ca3e162387a2b6964dacaa83604e065c4e9",
      "tree": "dfb289e314ac7475c778a3ea8d3050d4652c31b1",
      "parents": [
        "633257d3db547e7553500f05e0aa2692c876d7a5"
      ],
      "author": {
        "name": "Abhijeet Kolekar",
        "email": "abhijeet.kolekar@intel.com",
        "time": "Fri May 23 10:15:26 2008 -0700"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed May 28 16:43:46 2008 -0400"
      },
      "message": "mac80211 : Fixes the status message for iwconfig\n\niwconfig was showing incorrect status messages when disassociated.\nPatch fixes this by always checking for association status in\nioctl calls for getting ap address.\n\nSigned-off-by: Abhijeet Kolekar \u003cabhijeet.kolekar@intel.com\u003e\nAcked-by: Dan Williams \u003cdcbw@redhat.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "9381be059bf5831d259e8735005cfa35b7488543",
      "tree": "ac65a2e43915cba20d339a6040670e3376daa6dc",
      "parents": [
        "3bf0a32e22fedc0b46443699db2d61ac2a883ac4"
      ],
      "author": {
        "name": "Tomas Winkler",
        "email": "tomas.winkler@intel.com",
        "time": "Fri May 23 01:36:36 2008 +0300"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed May 28 16:43:43 2008 -0400"
      },
      "message": "mac80211: reorder channel and freq reporting in wext scan report\n\nThis patch switch order of channel and freq (SIOCGIWFREQ) reports\nin scan results in order to overcome wpa_supplicant inability\nto handle channel numbers in 5.2Ghz band.\nWext reporting channel number is ambiguous as channels 7-12 (802.11j)\nexist on both bands.\n\nSigned-off-by: Tomas Winkler \u003ctomas.winkler@intel.com\u003e\nSigned-off-by: Emmanuel Grumbach \u003cemmanuel.grumbach@intel.com\u003e\nAcked-by: Dan Williams \u003cdcbw@redhat.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "167ad6f7a2b2ae58dfaa46620b9b3212594f38e6",
      "tree": "7deb19348ed23e84ff99295680fce7c201d50a29",
      "parents": [
        "679fda1aa49fddf938bb699df7867c01988371ab"
      ],
      "author": {
        "name": "Tomas Winkler",
        "email": "tomas.winkler@intel.com",
        "time": "Wed May 21 18:17:05 2008 +0300"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed May 28 16:43:42 2008 -0400"
      },
      "message": "mac80211: fix ieee80211_rx_bss_put/get imbalance\n\nThis patch fixes iee80211_rx_bss_put/get imbalance\nintroduced by \u0027mac80211: enable IBSS merging\u0027 patch.\n\nSigned-off-by: Tomas Winkler \u003ctomas.winkler@intel.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "679fda1aa49fddf938bb699df7867c01988371ab",
      "tree": "722b26d78f285fc1d248f0e981e827769f45a616",
      "parents": [
        "6b4bec010d888c5b8c731aa596635cd83dd3416c"
      ],
      "author": {
        "name": "Nicolas Kaiser",
        "email": "nikai@nikai.net",
        "time": "Tue May 20 18:42:54 2008 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed May 28 16:43:41 2008 -0400"
      },
      "message": "net/mac80211: always true conditionals\n\nCorrect always true conditionals.\n\nSigned-off-by: Nicolas Kaiser \u003cnikai@nikai.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "825de27d9e40b3117b29a79d412b7a4b78c5d815",
      "tree": "95ab0dc853b2f68d529162e5f1dfd5e0cb5e37a9",
      "parents": [
        "6079a463cf95fafcc704a4e5e92a4da12444bd3c"
      ],
      "author": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Tue May 27 06:33:54 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 27 06:33:54 2008 -0700"
      },
      "message": "dccp ccid-3: Fix \"t_ipi explosion\" bug\n\nThe identification of this bug is thanks to Cheng Wei and Tomasz\nGrobelny.\n\nTo avoid divide-by-zero, the implementation previously ignored RTTs\nsmaller than 4 microseconds when performing integer division RTT/4.\n\nWhen the RTT reached a value less than 4 microseconds (as observed on\nloopback), this prevented the Window Counter CCVal value from\nadvancing. As a result, the receiver stopped sending feedback. This in\nturn caused non-ending expiries of the nofeedback timer at the sender,\nso that the sending rate was progressively reduced until reaching the\nminimum of one packet per 64 seconds.\n\nThe patch fixes this bug by handling integer division more\nintelligently. Due to consistent use of dccp_sample_rtt(),\ndivide-by-zero-RTT is avoided.\n\nSigned-off-by: Gerrit Renker \u003cgerrit@erg.abdn.ac.uk\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6079a463cf95fafcc704a4e5e92a4da12444bd3c",
      "tree": "00080f77f8bef52b78cdbb8762c2625dac18b4fc",
      "parents": [
        "289c79a4bd350e8a25065102563ad1a183d1b402"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Tue May 27 06:22:38 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 27 06:22:38 2008 -0700"
      },
      "message": "dccp: Fix to handle short sequence numbers packet correctly\n\nRFC4340 said:\n  8.5.  Pseudocode\n       ...\n       If P.type is not Data, Ack, or DataAck and P.X \u003d\u003d 0 (the packet\n             has short sequence numbers), drop packet and return\n\nBut DCCP has some mistake to handle short sequence numbers packet, now\nit drop packet only if P.type is Data, Ack, or DataAck and P.X \u003d\u003d 0.\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nAcked-by: Gerrit Renker \u003cgerrit@erg.abdn.ac.uk\u003e\nAcked-by: Arnaldo Carvalho de Melo \u003cacme@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c5e6fd28e5776200a737e9df337a529d36fa9a54",
      "tree": "df9f926123dd9cbaa9e57f13cc44200c50ee5cbc",
      "parents": [
        "b3733034f113a4119f734b84e94180a42c8bc1a1",
        "289c79a4bd350e8a25065102563ad1a183d1b402"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon May 26 10:14:02 2008 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon May 26 10:14:02 2008 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (52 commits)\n  vlan: Use bitmask of feature flags instead of seperate feature bits\n  fmvj18x_cs: add NextCom NC5310 rev B support\n  xirc2ps_cs: re-initialize the multicast address in do_reset\n  3C509: rx_bytes should not be increased when alloc_skb failed\n  NETFRONT: Use __skb_queue_purge()\n  VIRTIO: Use __skb_queue_purge()\n  phylib: do EXPORT_SYMBOL on get_phy_id\n  netlink: Fix nla_parse_nested_compat() to call nla_parse() directly\n  WAN: protect HDLC proto list while insmod/rmmod\n  drivers/net/fs_enet: remove null pointer dereference\n  S2io: Version update for napi and MSI-X patches\n  S2io: Added napi support when MSIX is enabled.\n  S2io: Move all the transmit completions to a single msi-x (alarm) vector\n  drivers/net/ehea - remove unnecessary memset after kzalloc\n  au1000_eth: remove useless check\n  Blackfin EMAC Driver: Removed duplicated include \u003clinux/ethtool.h\u003e\n  cpmac bugfixes and enhancements\n  e1000e: use resource_size_t, not unsigned long, for phys addrs\n  net/usb: add support for Apple USB Ethernet Adapter\n  uli526x: add support for netpoll\n  ...\n"
    },
    {
      "commit": "289c79a4bd350e8a25065102563ad1a183d1b402",
      "tree": "2067cb054704c62c3debfe92a3f00dc551ff7162",
      "parents": [
        "7bece8155be133cd67c41eed2b31c60a310609de"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Fri May 23 00:22:04 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri May 23 00:27:50 2008 -0700"
      },
      "message": "vlan: Use bitmask of feature flags instead of seperate feature bits\n\nHerbert Xu points out that the use of seperate feature bits for features\nto be propagated to VLAN devices is going to get messy real soon.\nReplace the VLAN feature bits by a bitmask of feature flags to be\npropagated and restore the old GSO_SHIFT/MASK values.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a0abb93bf9dc590b031a1123f3e6c6c225c1cdd1",
      "tree": "201dc475cbe3c7eae00fe1cab9615be3b0a0d186",
      "parents": [
        "9956c1120826bce3b42093099a0149b7f62d0b8a",
        "071f92d05967a0c8422f1c8587ce0b4d90a8b447"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed May 21 22:14:39 2008 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed May 21 22:14:39 2008 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6:\n  net: The world is not perfect patch.\n  tcp: Make prior_ssthresh a u32\n  xfrm_user: Remove zero length key checks.\n  net/ipv4/arp.c: Use common hex_asc helpers\n  cassini: Only use chip checksum for ipv4 packets.\n  tcp: TCP connection times out if ICMP frag needed is delayed\n  netfilter: Move linux/types.h inclusions outside of #ifdef __KERNEL__\n  af_key: Fix selector family initialization.\n  libertas: Fix ethtool statistics\n  mac80211: fix NULL pointer dereference in ieee80211_compatible_rates\n  mac80211: don\u0027t claim iwspy support\n  orinoco_cs: add ID for SpeedStream wireless adapters\n  hostap_cs: add ID for Conceptronic CON11CPro\n  rtl8187: resource leak in error case\n  ath5k: Fix loop variable initializations\n"
    },
    {
      "commit": "071f92d05967a0c8422f1c8587ce0b4d90a8b447",
      "tree": "bfebe6c0dc4e1b00e0fec0342bda4819e9dda754",
      "parents": [
        "4b749440445ebcb6fad402fc762bc35af871f689"
      ],
      "author": {
        "name": "Rami Rosen",
        "email": "ramirose@gmail.com",
        "time": "Wed May 21 17:47:54 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed May 21 17:47:54 2008 -0700"
      },
      "message": "net: The world is not perfect patch.\n\n  Unless there will be any objection here, I suggest consider the\nfollowing patch which simply removes the code for the\n-DI_WISH_WORLD_WERE_PERFECT in the three methods which use it.\n\nThe compilation errors we get when using -DI_WISH_WORLD_WERE_PERFECT\nshow that this code was not built and not used for really a long time.\n\nSigned-off-by: Rami Rosen \u003cramirose@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "88860c9ef45963eb69411b0d2ace4e8ba0f7a32f",
      "tree": "043447814c6913d16a5a191dced1989d81cc4fb3",
      "parents": [
        "51f82a2b128131c411880aed2cb802b166fe3445"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed May 21 17:36:21 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed May 21 17:36:21 2008 -0700"
      },
      "message": "xfrm_user: Remove zero length key checks.\n\nThe crypto layer will determine whether that is valid\nor not.\n\nSuggested by Herbert Xu, based upon a report and patch\nby Martin Willi.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "51f82a2b128131c411880aed2cb802b166fe3445",
      "tree": "fe5012bc03369ef2247c148720344a834a226b2f",
      "parents": [
        "b1443e2f6501f06930a162ff1ff08382a98bf23e"
      ],
      "author": {
        "name": "Denis Cheng",
        "email": "crquan@gmail.com",
        "time": "Wed May 21 17:34:32 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed May 21 17:34:32 2008 -0700"
      },
      "message": "net/ipv4/arp.c: Use common hex_asc helpers\n\nHere the local hexbuf is a duplicate of global const char hex_asc from\nlib/hexdump.c, except the hex letters\u0027 cases:\n\n\tconst char hexbuf[] \u003d \"0123456789ABCDEF\";\n\n\tconst char hex_asc[] \u003d \"0123456789abcdef\";\n\nand here to print HW addresses, the hex cases are not significant.\n\nThanks to Harvey Harrison to introduce the hex_asc_hi/hex_asc_lo helpers.\n\nSigned-off-by: Denis Cheng \u003ccrquan@gmail.com\u003e\nSigned-off-by: Harvey Harrison \u003charvey.harrison@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7d227cd235c809c36c847d6a597956ad9e9d2bae",
      "tree": "1d47c5edbb5b270930f7b76b53baac0582cf60e4",
      "parents": [
        "c8942f1f0a7e2160ebf2e51ba89e50ee5895a1e7"
      ],
      "author": {
        "name": "Sridhar Samudrala",
        "email": "sri@us.ibm.com",
        "time": "Wed May 21 16:42:20 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed May 21 16:42:20 2008 -0700"
      },
      "message": "tcp: TCP connection times out if ICMP frag needed is delayed\n\nWe are seeing an issue with TCP in handling an ICMP frag needed\nmessage that is received after net.ipv4.tcp_retries1 retransmits.\nThe default value of retries1 is 3. So if the path mtu changes\nand ICMP frag needed is lost for the first 3 retransmits or if\nit gets delayed until 3 retransmits are done, TCP doesn\u0027t update\nMSS correctly and continues to retransmit the orginal message\nuntil it timesout after tcp_retries2 retransmits.\n\nI am seeing this issue even with the latest 2.6.25.4 kernel.\n\nIn tcp_retransmit_timer(), when retransmits counter exceeds \ntcp_retries1 value, the dst cache entry of the socket is reset.\nAt this time, if we receive an ICMP frag needed message, the \ndst entry gets updated with the new MTU, but the TCP sockets\ndst_cache entry remains NULL.\n\nSo the next time when we try to retransmit after the ICMP frag\nneeded is received, tcp_retransmit_skb() gets called. Here the\ncur_mss value is calculated at the start of the routine with\na NULL sk_dst_cache. Instead we should call tcp_current_mss after\nthe rebuild_header that caches the dst entry with the updated mtu.\nAlso the rebuild_header should be called before tcp_fragment\nso that skb is fragmented if the mss goes down.\n\nSigned-off-by: Sridhar Samudrala \u003csri@us.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4da5105687e0993a3bbdcffd89b2b94d9377faab",
      "tree": "bd6a67ec275f11f633224aa683e4102437a2d646",
      "parents": [
        "d8ac48d4cbae0cc59b7784399292fbda3e231be3"
      ],
      "author": {
        "name": "Kazunori MIYAZAWA",
        "email": "kazunori@miyazawa.org",
        "time": "Wed May 21 13:26:11 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed May 21 13:26:11 2008 -0700"
      },
      "message": "af_key: Fix selector family initialization.\n\nThis propagates the xfrm_user fix made in commit\nbcf0dda8d2408fe1c1040cdec5a98e5fcad2ac72 (\"[XFRM]: xfrm_user: fix\nselector family initialization\")\n\nBased upon a bug report from, and tested by, Alan Swanson.\n\nSigned-off-by: Kazunori MIYAZAWA \u003ckazunori@miyazawa.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n\n"
    },
    {
      "commit": "d8ac48d4cbae0cc59b7784399292fbda3e231be3",
      "tree": "9fc0adc5c8685e13f2b7208687ae409a98c3f99c",
      "parents": [
        "d3ede327e83f202c3a0962e207318f65717c5eb7",
        "5d283e8cdb8097b6a3e9304c9c8942ad9dc1a4eb"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 20 20:34:22 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 20 20:34:22 2008 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of master.kernel.org:/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "0d580a774b3682b8b2b5c89ab9b813d149ef28e7",
      "tree": "21ff9c9354ac7ed73d35fb86062c65d78d8614d7",
      "parents": [
        "51e779f0daa5c712439d37b907d58543e4fcf12a"
      ],
      "author": {
        "name": "Helmut Schaa",
        "email": "hschaa@suse.de",
        "time": "Tue May 20 09:56:37 2008 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue May 20 22:40:30 2008 -0400"
      },
      "message": "mac80211: fix NULL pointer dereference in ieee80211_compatible_rates\n\nFix a possible NULL pointer dereference in ieee80211_compatible_rates\nintroduced in the patch \"mac80211: fix association with some APs\". If no bss\nis available just use all supported rates in the association request.\n\nSigned-off-by: Helmut Schaa \u003chschaa@suse.de\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "d40ace0c7b4a329f7d869d0fbf27435543bb2acc",
      "tree": "6fa319ba10931ed815ec78895e3ec2160ac1ee34",
      "parents": [
        "e616c6303306df62223ebe2e68bb2f19c420dd81",
        "68432a03f8ff93a9eecee95cc8f02e7fe2025cc9"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue May 20 19:30:54 2008 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue May 20 19:30:54 2008 -0700"
      },
      "message": "Merge branch \u0027for-2.6.26\u0027 of git://linux-nfs.org/~bfields/linux\n\n* \u0027for-2.6.26\u0027 of git://linux-nfs.org/~bfields/linux: (25 commits)\n  svcrdma: Verify read-list fits within RPCSVC_MAXPAGES\n  svcrdma: Change svc_rdma_send_error return type to void\n  svcrdma: Copy transport address and arm CQ before calling rdma_accept\n  svcrdma: Set rqstp transport address in rdma_read_complete function\n  svcrdma: Use ib verbs version of dma_unmap\n  svcrdma: Cleanup queued, but unprocessed I/O in svc_rdma_free\n  svcrdma: Move the QP and cm_id destruction to svc_rdma_free\n  svcrdma: Add reference for each SQ/RQ WR\n  svcrdma: Move destroy to kernel thread\n  svcrdma: Shrink scope of spinlock on RQ CQ\n  svcrdma: Use standard Linux lists for context cache\n  svcrdma: Simplify RDMA_READ deferral buffer management\n  svcrdma: Remove unused READ_DONE context flags bit\n  svcrdma: Return error from rdma_read_xdr so caller knows to free context\n  svcrdma: Fix error handling during listening endpoint creation\n  svcrdma: Free context on post_recv error in send_reply\n  svcrdma: Free context on ib_post_recv error\n  svcrdma: Add put of connection ESTABLISHED reference in rdma_cma_handler\n  svcrdma: Fix return value in svc_rdma_send\n  svcrdma: Fix race with dto_tasklet in svc_rdma_send\n  ...\n"
    },
    {
      "commit": "e616c6303306df62223ebe2e68bb2f19c420dd81",
      "tree": "d60d372fac5ceb4da71ac3802422b9b0ae52b20d",
      "parents": [
        "789319db76ccb8f61d2f6a91d2f2fcb70edae9c5",
        "d3ede327e83f202c3a0962e207318f65717c5eb7"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue May 20 17:23:03 2008 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue May 20 17:23:03 2008 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (27 commits)\n  pktgen: make sure that pktgen_thread_worker has been executed\n  [VLAN]: Propagate selected feature bits to VLAN devices\n  drivers/atm/: remove CVS keywords\n  vlan: Correctly handle device notifications for layered VLAN devices\n  net: Fix call to -\u003echange_rx_flags(dev, IFF_MULTICAST) in dev_change_flags()\n  net_sched: cls_api: fix return value for non-existant classifiers\n  ipsec: Use the correct ip_local_out function\n  ipv6 addrconf: Allow infinite prefix lifetime.\n  ipv6 route: Fix lifetime in netlink.\n  ipv6 addrconf: Fix route lifetime setting in corner case.\n  ndisc: Add missing strategies for per-device retrans timer/reachable time settings.\n  ipv6: Move \u003clinux/in6.h\u003e from header-y to unifdef-y.\n  l2tp: avoid skb truesize bug if headroom is increased\n  wireless: Create \u0027device\u0027 symlink in sysfs\n  wireless, airo: waitbusy() won\u0027t delay\n  libertas: fix command timeout after firmware failure\n  mac80211: Add RTNL version of ieee80211_iterate_active_interfaces\n  mac80211 : Association with 11n hidden ssid ap.\n  hostap: fix \"registers\" registration in procfs\n  isdn/capi: Return proper errnos on module init.\n  ...\n"
    },
    {
      "commit": "68432a03f8ff93a9eecee95cc8f02e7fe2025cc9",
      "tree": "9a9e98a0233a7f3b4d66df19d8ded26d0b41c0ed",
      "parents": [
        "d71a4dd72e67210ae0767ccae69c79f1c933ff64",
        "a6f911c04e20b98feb4b33d3aba2976851977d6a"
      ],
      "author": {
        "name": "J. Bruce Fields",
        "email": "bfields@citi.umich.edu",
        "time": "Tue May 20 19:57:38 2008 -0400"
      },
      "committer": {
        "name": "J. Bruce Fields",
        "email": "bfields@citi.umich.edu",
        "time": "Tue May 20 19:57:38 2008 -0400"
      },
      "message": "Merge branch \u0027from-tomtucker\u0027 into for-2.6.26\n"
    },
    {
      "commit": "d3ede327e83f202c3a0962e207318f65717c5eb7",
      "tree": "2875979c06b127edc325bf77518837c28477ebd5",
      "parents": [
        "5fb13570543f4ae022996c9d7c0c099c8abf22dd"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Tue May 20 15:12:44 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 20 15:12:44 2008 -0700"
      },
      "message": "pktgen: make sure that pktgen_thread_worker has been executed\n\nThe following courruption can happen during pktgen stop:\nlist_del corruption. prev-\u003enext should be ffff81007e8a5e70, but was 6b6b6b6b6b6b6b6b\nkernel BUG at lib/list_debug.c:67!\n      :pktgen:pktgen_thread_worker+0x374/0x10b0\n      ? autoremove_wake_function+0x0/0x40\n      ? _spin_unlock_irqrestore+0x42/0x80\n      ? :pktgen:pktgen_thread_worker+0x0/0x10b0\n      kthread+0x4d/0x80\n      child_rip+0xa/0x12\n      ? restore_args+0x0/0x30\n      ? kthread+0x0/0x80\n      ? child_rip+0x0/0x12\nRIP  list_del+0x48/0x70\n\nThe problem is that pktgen_thread_worker can not be executed if kthread_stop\nhas been called too early. Insert a completion on the normal initialization\npath to make sure that pktgen_thread_worker will gain the control for sure.\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nAcked-by: Alexey Dobriyan \u003cadobriyan@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "51e779f0daa5c712439d37b907d58543e4fcf12a",
      "tree": "4430630ef0169580c22be18f2711dfb67c3a8612",
      "parents": [
        "682c97c04b3041d0f29241b8bfa013093201e269"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Mon May 19 07:18:10 2008 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Tue May 20 17:55:30 2008 -0400"
      },
      "message": "mac80211: don\u0027t claim iwspy support\n\nWe removed iwspy support a very long time ago because it is useless, but\nforgot to stop claiming to support it. Apparently, nobody cares, but\nremove it nonetheless.\n\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "5fb13570543f4ae022996c9d7c0c099c8abf22dd",
      "tree": "bf0f837d4b2dd778c32cf8fcf719913203f1cd39",
      "parents": [
        "7ff6e6f779960e1078a78b60a881571c04f52b9b"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue May 20 14:54:50 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 20 14:54:50 2008 -0700"
      },
      "message": "[VLAN]: Propagate selected feature bits to VLAN devices\n\nPropagate feature bits from the NETDEV_FEAT_CHANGE notifier. For now\nonly TSO is propagated for devices that announce their ability to\nsupport TSO in combination with VLAN accel by setting the NETIF_F_VLAN_TSO\nflag.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "81d85346b3fcd8b3167eac8b5fb415a210bd4345",
      "tree": "5a5827b8f6d2e8b06f31ccb69ce94ce28ac51439",
      "parents": [
        "0e91796eb46e29edc791131c832a2232bcaed9dd"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue May 20 14:37:36 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 20 14:37:36 2008 -0700"
      },
      "message": "vlan: Correctly handle device notifications for layered VLAN devices\n\nCommit 30688a9 ([VLAN]: Handle vlan devices net namespace changing)\nchanged the device notifier to special-case notifications for VLAN\ndevices, effectively disabling state propagation to underlying VLAN\ndevices. This is needed for layered VLANs though, so restore the\noriginal behaviour.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nAcked-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0e91796eb46e29edc791131c832a2232bcaed9dd",
      "tree": "e175a4b0de48e9e44b94e52dd634d38618193add",
      "parents": [
        "f2df824948d559ea818e03486a8583e42ea6ab37"
      ],
      "author": {
        "name": "David Woodhouse",
        "email": "dwmw2@infradead.org",
        "time": "Tue May 20 14:36:14 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 20 14:36:14 2008 -0700"
      },
      "message": "net: Fix call to -\u003echange_rx_flags(dev, IFF_MULTICAST) in dev_change_flags()\n\nAm I just being particularly dim today, or can the call to\ndev-\u003echange_rx_flags(dev, IFF_MULTICAST) in dev_change_flags() never\nhappen?\n\nWe\u0027ve just set dev-\u003eflags \u003d flags \u0026 IFF_MULTICAST, effectively. So the\ncondition \u0027(dev-\u003eflags ^ flags) \u0026 IFF_MULTICAST\u0027 is _never_ going to be\ntrue.\n\nSigned-off-by: David Woodhouse \u003cdwmw2@infradead.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f2df824948d559ea818e03486a8583e42ea6ab37",
      "tree": "7566318874c03d1513011208c8bf378282298444",
      "parents": [
        "1ac06e0306d0192a7a4d9ea1c9e06d355ce7e7d3"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue May 20 14:34:46 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 20 14:34:46 2008 -0700"
      },
      "message": "net_sched: cls_api: fix return value for non-existant classifiers\n\ncls_api should return ENOENT when the requested classifier doesn\u0027t\nexist.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    }
  ],
  "next": "1ac06e0306d0192a7a4d9ea1c9e06d355ce7e7d3"
}
