)]}'
{
  "log": [
    {
      "commit": "4b4a2700f462102569b407102c60d3b9cf4432a0",
      "tree": "d326b404c99ca477d47aa0e06eb64f0b3e2d8347",
      "parents": [
        "f69fa76482e654f7d94e4aa40ea0ebf04363396a",
        "22e76c849d505d87c5ecf3d3e6742a65f0ff4860"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Nov 05 15:25:48 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Nov 05 15:25:48 2010 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (41 commits)\n  inet_diag: Make sure we actually run the same bytecode we audited.\n  netlink: Make nlmsg_find_attr take a const nlmsghdr*.\n  fib: fib_result_assign() should not change fib refcounts\n  netfilter: ip6_tables: fix information leak to userspace\n  cls_cgroup: Fix crash on module unload\n  memory corruption in X.25 facilities parsing\n  net dst: fix percpu_counter list corruption and poison overwritten\n  rds: Remove kfreed tcp conn from list\n  rds: Lost locking in loop connection freeing\n  de2104x: fix panic on load\n  atl1 : fix panic on load\n  netxen: remove unused firmware exports\n  caif: Remove noisy printout when disconnecting caif socket\n  caif: SPI-driver bugfix - incorrect padding.\n  caif: Bugfix for socket priority, bindtodev and dbg channel.\n  smsc911x: Set Ethernet EEPROM size to supported device\u0027s size\n  ipv4: netfilter: ip_tables: fix information leak to userland\n  ipv4: netfilter: arp_tables: fix information leak to userland\n  cxgb4vf: remove call to stop TX queues at load time.\n  cxgb4: remove call to stop TX queues at load time.\n  ...\n"
    },
    {
      "commit": "22e76c849d505d87c5ecf3d3e6742a65f0ff4860",
      "tree": "ba8ac3765ae60f1bc8ce20d280baa741eb7b046e",
      "parents": [
        "6b8c92ba07287578718335ce409de8e8d7217e40"
      ],
      "author": {
        "name": "Nelson Elhage",
        "email": "nelhage@ksplice.com",
        "time": "Wed Nov 03 16:35:41 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 04 12:26:34 2010 -0700"
      },
      "message": "inet_diag: Make sure we actually run the same bytecode we audited.\n\nWe were using nlmsg_find_attr() to look up the bytecode by attribute when\nauditing, but then just using the first attribute when actually running\nbytecode. So, if we received a message with two attribute elements, where only\nthe second had type INET_DIAG_REQ_BYTECODE, we would validate and run different\nbytecode strings.\n\nFix this by consistently using nlmsg_find_attr everywhere.\n\nSigned-off-by: Nelson Elhage \u003cnelhage@ksplice.com\u003e\nSigned-off-by: Thomas Graf \u003ctgraf@infradead.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1f1b9c9990205759aae31b7734b0ede41a867f32",
      "tree": "aba367dd7280ff38932c881a0fcf5356bea53df2",
      "parents": [
        "cccbe5ef85284621d19e5b2b1c61cc0506bc9dee"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Nov 04 01:21:39 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Nov 04 12:05:32 2010 -0700"
      },
      "message": "fib: fib_result_assign() should not change fib refcounts\n\nAfter commit ebc0ffae5 (RCU conversion of fib_lookup()),\nfib_result_assign()  should not change fib refcounts anymore.\n\nThanks to Michael who did the bisection and bug report.\n\nReported-by: Michael Ellerman \u003cmichael@ellerman.id.au\u003e\nTested-by: Michael Ellerman \u003cmichael@ellerman.id.au\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cccbe5ef85284621d19e5b2b1c61cc0506bc9dee",
      "tree": "f5caaa67b6e3ede98d691891f9cacf5d9886877d",
      "parents": [
        "758cb41106e87d7e26ef3ee78f04360168460b9d"
      ],
      "author": {
        "name": "Jan Engelhardt",
        "email": "jengelh@medozas.de",
        "time": "Wed Nov 03 18:55:39 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 03 18:55:39 2010 -0700"
      },
      "message": "netfilter: ip6_tables: fix information leak to userspace\n\nSigned-off-by: Jan Engelhardt \u003cjengelh@medozas.de\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "758cb41106e87d7e26ef3ee78f04360168460b9d",
      "tree": "873bc9328c6c210904382536eb6fdf82ff78004b",
      "parents": [
        "c00b2c9e79466d61979cd21af526cc6d5d0ee04f",
        "b5f15ac4f89f84853544c934fc7a744289e95e34"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 03 18:52:32 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 03 18:52:32 2010 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6\n"
    },
    {
      "commit": "c00b2c9e79466d61979cd21af526cc6d5d0ee04f",
      "tree": "300e44d04f76b860580cb1ca5f0fc7b37112375a",
      "parents": [
        "a6331d6f9a4298173b413cf99a40cc86a9d92c37"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Nov 03 13:31:05 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 03 18:50:50 2010 -0700"
      },
      "message": "cls_cgroup: Fix crash on module unload\n\nSomewhere along the lines net_cls_subsys_id became a macro when\ncls_cgroup is built as a module.  Not only did it make cls_cgroup\ncompletely useless, it also causes it to crash on module unload.\n\nThis patch fixes this by removing that macro.\n\nThanks to Eric Dumazet for diagnosing this problem.\n\nReported-by: Randy Dunlap \u003crandy.dunlap@oracle.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nReviewed-by: Li Zefan \u003clizf@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a6331d6f9a4298173b413cf99a40cc86a9d92c37",
      "tree": "b665efee7dae4472e0f4521bbdd3aef626813ba6",
      "parents": [
        "41bb78b4b9adb21cf2c395b6b880aaae99c788b7"
      ],
      "author": {
        "name": "andrew hendry",
        "email": "andrew.hendry@gmail.com",
        "time": "Wed Nov 03 12:54:53 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 03 18:50:50 2010 -0700"
      },
      "message": "memory corruption in X.25 facilities parsing\n\nSigned-of-by: Andrew Hendry \u003candrew.hendry@gmail.com\u003e\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "41bb78b4b9adb21cf2c395b6b880aaae99c788b7",
      "tree": "34f099b4773150e0fa850d56be33fd46c3d29907",
      "parents": [
        "8200a59f24aeca379660f80658a8c0c343ca5c31"
      ],
      "author": {
        "name": "Xiaotian Feng",
        "email": "dfeng@redhat.com",
        "time": "Tue Nov 02 16:11:05 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 03 18:50:07 2010 -0700"
      },
      "message": "net dst: fix percpu_counter list corruption and poison overwritten\n\nThere\u0027re some percpu_counter list corruption and poison overwritten warnings\nin recent kernel, which is resulted by fc66f95c.\n\ncommit fc66f95c switches to use percpu_counter, in ip6_route_net_init, kernel\ninit the percpu_counter for dst entries, but, the percpu_counter is never destroyed\nin ip6_route_net_exit. So if the related data is freed by kernel, the freed percpu_counter\nis still on the list, then if we insert/remove other percpu_counter, list corruption\nresulted. Also, if the insert/remove option modifies the -\u003eprev,-\u003enext pointer of\nthe freed value, the poison overwritten is resulted then.\n\nWith the following patch, the percpu_counter list corruption and poison overwritten\nwarnings disappeared.\n\nSigned-off-by: Xiaotian Feng \u003cdfeng@redhat.com\u003e\nCc: \"David S. Miller\" \u003cdavem@davemloft.net\u003e\nCc: Alexey Kuznetsov \u003ckuznet@ms2.inr.ac.ru\u003e\nCc: \"Pekka Savola (ipv6)\" \u003cpekkas@netcore.fi\u003e\nCc: James Morris \u003cjmorris@namei.org\u003e\nCc: Hideaki YOSHIFUJI \u003cyoshfuji@linux-ipv6.org\u003e\nCc: Patrick McHardy \u003ckaber@trash.net\u003e\nAcked-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8200a59f24aeca379660f80658a8c0c343ca5c31",
      "tree": "fc21336c6dd33ee96d7cf9f07f20132d4a46994e",
      "parents": [
        "58c490babd4b425310363cbd1f406d7e508f77a5"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@parallels.com",
        "time": "Tue Nov 02 01:54:01 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 03 18:50:07 2010 -0700"
      },
      "message": "rds: Remove kfreed tcp conn from list\n\nAll the rds_tcp_connection objects are stored list, but when\nbeing freed it should be removed from there.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "58c490babd4b425310363cbd1f406d7e508f77a5",
      "tree": "48b4697403815b06da6a6dcf4c3495bd1401a51f",
      "parents": [
        "53ab2221da7676dd0f161bec5e1520e56b74a865"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@parallels.com",
        "time": "Tue Nov 02 01:52:05 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 03 18:50:06 2010 -0700"
      },
      "message": "rds: Lost locking in loop connection freeing\n\nThe conn is removed from list in there and this requires\nproper lock protection.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "47d1ff176553fec3cb17854a7ca85036d3b0c4e7",
      "tree": "b5c212fb0a972cab95e9ddc3851622adc4be9693",
      "parents": [
        "2c24a5d1b4f48900f3ed1b1ad70c51f1983df822"
      ],
      "author": {
        "name": "sjur.brandeland@stericsson.com",
        "email": "sjur.brandeland@stericsson.com",
        "time": "Wed Nov 03 10:19:25 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 03 18:50:04 2010 -0700"
      },
      "message": "caif: Remove noisy printout when disconnecting caif socket\n\nSigned-off-by: Sjur Brændeland \u003csjur.brandeland@stericsson.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f2527ec436fd675f08a8e7434f6e940688cb96d0",
      "tree": "f3c723c652b58cd4862d635e598a4ad88eedec64",
      "parents": [
        "6cc0e949afe757d240fba4ad1839a27f66c3bd72"
      ],
      "author": {
        "name": "André Carvalho de Matos",
        "email": "andre.carvalho.matos@stericsson.com",
        "time": "Mon Nov 01 11:52:47 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 03 18:50:03 2010 -0700"
      },
      "message": "caif: Bugfix for socket priority, bindtodev and dbg channel.\n\nChanges:\no Bugfix: SO_PRIORITY for SOL_SOCKET could not be handled\n  in caif\u0027s setsockopt,  using the struct sock attribute priority instead.\n\no Bugfix: SO_BINDTODEVICE for SOL_SOCKET could not be handled\n  in caif\u0027s setsockopt,  using the struct sock attribute ifindex instead.\n\no Wrong assert statement for RFM layer segmentation.\n\no CAIF Debug channels was not working over SPI, caif_payload_info\n  containing padding info must be initialized.\n\no Check on pointer before dereferencing when unregister dev in caif_dev.c\n\nSigned-off-by: Sjur Braendeland \u003csjur.brandeland@stericsson.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b5f15ac4f89f84853544c934fc7a744289e95e34",
      "tree": "35f89a706003f9e9343bd63fc5d560cf33a579a7",
      "parents": [
        "1a8b7a67224eb0c9dbd883b9bfc4938278bad370"
      ],
      "author": {
        "name": "Vasiliy Kulikov",
        "email": "segooon@gmail.com",
        "time": "Wed Nov 03 08:45:06 2010 +0100"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Nov 03 08:45:06 2010 +0100"
      },
      "message": "ipv4: netfilter: ip_tables: fix information leak to userland\n\nStructure ipt_getinfo is copied to userland with the field \"name\"\nthat has the last elements unitialized.  It leads to leaking of\ncontents of kernel stack memory.\n\nSigned-off-by: Vasiliy Kulikov \u003csegooon@gmail.com\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "1a8b7a67224eb0c9dbd883b9bfc4938278bad370",
      "tree": "31697d77831109c760001a8a78053dab0fb74ac5",
      "parents": [
        "d817d29d0b37290d90b3a9e2a61162f1dbf2be4f"
      ],
      "author": {
        "name": "Vasiliy Kulikov",
        "email": "segooon@gmail.com",
        "time": "Wed Nov 03 08:44:12 2010 +0100"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Nov 03 08:44:12 2010 +0100"
      },
      "message": "ipv4: netfilter: arp_tables: fix information leak to userland\n\nStructure arpt_getinfo is copied to userland with the field \"name\"\nthat has the last elements unitialized.  It leads to leaking of\ncontents of kernel stack memory.\n\nSigned-off-by: Vasiliy Kulikov \u003csegooon@gmail.com\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "df32cc193ad88f7b1326b90af799c927b27f7654",
      "tree": "535d945c8507f8ac85575aed481bad9892a5e243",
      "parents": [
        "315daea9481277d9b8109b47e974835a901e4bc5"
      ],
      "author": {
        "name": "Tom Herbert",
        "email": "therbert@google.com",
        "time": "Mon Nov 01 12:55:52 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 01 12:55:52 2010 -0700"
      },
      "message": "net: check queue_index from sock is valid for device\n\nIn dev_pick_tx recompute the queue index if the value stored in the\nsocket is greater than or equal to the number of real queues for the\ndevice.  The saved index in the sock structure is not guaranteed to\nbe appropriate for the egress device (this could happen on a route\nchange or in presence of tunnelling).  The result of the queue index\nbeing bad would be to return a bogus queue (crash could prersumably\nfollow).\n\nSigned-off-by: Tom Herbert \u003ctherbert@google.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6f9b901823aafd14a84ae27f61ff28bafed01260",
      "tree": "b7625065b95573275a59197db8db6877ce010dd1",
      "parents": [
        "eae61ae15b752b919ea45746f6dff449ff6d3281"
      ],
      "author": {
        "name": "Dr. David Alan Gilbert",
        "email": "linux@treblig.org",
        "time": "Sun Oct 31 07:26:03 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 01 06:56:02 2010 -0700"
      },
      "message": "l2tp: kzalloc with swapped params in l2tp_dfs_seq_open\n\n  \u0027sparse\u0027 spotted that the parameters to kzalloc in l2tp_dfs_seq_open\nwere swapped.\n\nTested on current git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git\nat 1792f17b7210280a3d7ff29da9614ba779cfcedb  build, boots and I can see that directory,\nbut there again I could see /sys/kernel/debug/l2tp with it swapped; I don\u0027t have\nany l2tp in use.\n\nSigned-off-by: Dr. David Alan Gilbert \u003clinux@treblig.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5ec1cea057495b8f10bab0c1396a9d8e46b7b0a8",
      "tree": "2115be233a12ce363f669831f5a2a554bafc8565",
      "parents": [
        "636f8c6f682ee179ff39c94dc4d0be0ddd6c8cdd"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@infradead.org",
        "time": "Sun Oct 31 09:37:38 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Oct 31 09:37:38 2010 -0700"
      },
      "message": "text ematch: check for NULL pointer before destroying textsearch config\n\nWhile validating the configuration em_ops is already set, thus the\nindividual destroy functions are called, but the ematch data has\nnot been allocated and associated with the ematch yet.\n\nSigned-off-by: Thomas Graf \u003ctgraf@infradead.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3985c7ce85039adacdf882904ca096f091d39346",
      "tree": "afaf4161c4c3d9516cc09295eb30c0e22a8c3008",
      "parents": [
        "fcf744a96c66ca6ad7301a372034b771e57f30c4",
        "ce384d91cd7a4269a1ed5d4307a70aa4c6fa14f2"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sat Oct 30 18:42:58 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sat Oct 30 18:42:58 2010 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6:\n  isdn: mISDN: socket: fix information leak to userland\n  netdev: can: Change mail address of Hans J. Koch\n  pcnet_cs: add new_id\n  net: Truncate recvfrom and sendto length to INT_MAX.\n  RDS: Let rds_message_alloc_sgs() return NULL\n  RDS: Copy rds_iovecs into kernel memory instead of rereading from userspace\n  RDS: Clean up error handling in rds_cmsg_rdma_args\n  RDS: Return -EINVAL if rds_rdma_pages returns an error\n  net: fix rds_iovec page count overflow\n  can: pch_can: fix section mismatch warning by using a whitelisted name\n  can: pch_can: fix sparse warning\n  netxen_nic: Fix the tx queue manipulation bug in netxen_nic_probe\n  ip_gre: fix fallback tunnel setup\n  vmxnet: trivial annotation of protocol constant\n  vmxnet3: remove unnecessary byteswapping in BAR writing macros\n  ipv6/udp: report SndbufErrors and RcvbufErrors\n  phy/marvell: rename 88ec048 to 88e1318s and fix mscr1 addr\n"
    },
    {
      "commit": "253eacc070b114c2ec1f81b067d2fed7305467b0",
      "tree": "cf55d167c9a1a3fac2b7796f046674a53fbf47b0",
      "parents": [
        "d139ff0907dac9ef72fb2cf301e345bac3aec42f"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sat Oct 30 16:43:10 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Oct 30 16:44:07 2010 -0700"
      },
      "message": "net: Truncate recvfrom and sendto length to INT_MAX.\n\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d139ff0907dac9ef72fb2cf301e345bac3aec42f",
      "tree": "0ba63235a10b7640bc8b613da0d0cda220a55087",
      "parents": [
        "fc8162e3c034af743d8def435fda6396603d321f"
      ],
      "author": {
        "name": "Andy Grover",
        "email": "andy.grover@oracle.com",
        "time": "Thu Oct 28 15:40:59 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Oct 30 16:34:18 2010 -0700"
      },
      "message": "RDS: Let rds_message_alloc_sgs() return NULL\n\nEven with the previous fix, we still are reading the iovecs once\nto determine SGs needed, and then again later on. Preallocating\nspace for sg lists as part of rds_message seemed like a good idea\nbut it might be better to not do this. While working to redo that\ncode, this patch attempts to protect against userspace rewriting\nthe rds_iovec array between the first and second accesses.\n\nThe consequences of this would be either a too-small or too-large\nsg list array. Too large is not an issue. This patch changes all\ncallers of message_alloc_sgs to handle running out of preallocated\nsgs, and fail gracefully.\n\nSigned-off-by: Andy Grover \u003candy.grover@oracle.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fc8162e3c034af743d8def435fda6396603d321f",
      "tree": "b003a652740eb0de1fe71c634618b6666e9bae3c",
      "parents": [
        "f4a3fc03c1d73753879fb655b8cd628b29f6706b"
      ],
      "author": {
        "name": "Andy Grover",
        "email": "andy.grover@oracle.com",
        "time": "Thu Oct 28 15:40:58 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Oct 30 16:34:17 2010 -0700"
      },
      "message": "RDS: Copy rds_iovecs into kernel memory instead of rereading from userspace\n\nChange rds_rdma_pages to take a passed-in rds_iovec array instead\nof doing copy_from_user itself.\n\nChange rds_cmsg_rdma_args to copy rds_iovec array once only. This\neliminates the possibility of userspace changing it after our\nsanity checks.\n\nImplement stack-based storage for small numbers of iovecs, based\non net/socket.c, to save an alloc in the extremely common case.\n\nAlthough this patch reduces iovec copies in cmsg_rdma_args to 1,\nwe still do another one in rds_rdma_extra_size. Getting rid of\nthat one will be trickier, so it\u0027ll be a separate patch.\n\nSigned-off-by: Andy Grover \u003candy.grover@oracle.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f4a3fc03c1d73753879fb655b8cd628b29f6706b",
      "tree": "ad16a35e587408a396f2ab8e485428b8730fe733",
      "parents": [
        "a09f69c49b84b161ebd4dd09d3cce1b68297f1d3"
      ],
      "author": {
        "name": "Andy Grover",
        "email": "andy.grover@oracle.com",
        "time": "Thu Oct 28 15:40:57 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Oct 30 16:34:17 2010 -0700"
      },
      "message": "RDS: Clean up error handling in rds_cmsg_rdma_args\n\nWe don\u0027t need to set ret \u003d 0 at the end -- it\u0027s initialized to 0.\n\nAlso, don\u0027t increment s_send_rdma stat if we\u0027re exiting with an\nerror.\n\nSigned-off-by: Andy Grover \u003candy.grover@oracle.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a09f69c49b84b161ebd4dd09d3cce1b68297f1d3",
      "tree": "295290736f0a4dbbfc495e035adbbe0cafe447e4",
      "parents": [
        "1b1f693d7ad6d193862dcb1118540a030c5e761f"
      ],
      "author": {
        "name": "Andy Grover",
        "email": "andy.grover@oracle.com",
        "time": "Thu Oct 28 15:40:56 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Oct 30 16:34:16 2010 -0700"
      },
      "message": "RDS: Return -EINVAL if rds_rdma_pages returns an error\n\nrds_cmsg_rdma_args would still return success even if rds_rdma_pages\nreturned an error (or overflowed).\n\nSigned-off-by: Andy Grover \u003candy.grover@oracle.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1b1f693d7ad6d193862dcb1118540a030c5e761f",
      "tree": "cf216d1bfb8a51f3df2c989dcffd5381a0e446f1",
      "parents": [
        "bdfa3d8fe123a940be121daf374581727b3b6547"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Thu Oct 28 15:40:55 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Oct 30 16:34:16 2010 -0700"
      },
      "message": "net: fix rds_iovec page count overflow\n\nAs reported by Thomas Pollet, the rdma page counting can overflow.  We\nget the rdma sizes in 64-bit unsigned entities, but then limit it to\nUINT_MAX bytes and shift them down to pages (so with a possible \"+1\" for\nan unaligned address).\n\nSo each individual page count fits comfortably in an \u0027unsigned int\u0027 (not\neven close to overflowing into signed), but as they are added up, they\nmight end up resulting in a signed return value. Which would be wrong.\n\nCatch the case of tot_pages turning negative, and return the appropriate\nerror code.\n\nReported-by: Thomas Pollet \u003cthomas.pollet@gmail.com\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\nSigned-off-by: Andy Grover \u003candy.grover@oracle.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3285ee3bb2e158299ff19b947e41da735980d954",
      "tree": "8235c80ec137fd080e23bdeab8eefa0d9d5c395f",
      "parents": [
        "1b803fbfcd1c35857fe52844158213507a8a5bfa"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Sat Oct 30 16:21:28 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Oct 30 16:21:28 2010 -0700"
      },
      "message": "ip_gre: fix fallback tunnel setup\n\nBefore making the fallback tunnel visible to lookups, we should make\nsure it is completely setup, once ipgre_tunnel_init() had been called\nand tstats per_cpu pointer allocated.\n\nmove rcu_assign_pointer(ign-\u003etunnels_wc[0], tunnel); from\nipgre_fb_tunnel_init() to ipgre_init_net()\n\nBased on a patch from Pavel Emelyanov\n\nReported-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nAcked-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "870be39258cf84b65accf629f5f9e816b1b8512e",
      "tree": "ef9ff9af22efbcddf0b9bb961ff0bb8edc414501",
      "parents": [
        "337ac9d5218cc19f40fca13fa4deb3c658c4241b"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Sat Oct 30 16:17:23 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Oct 30 16:17:23 2010 -0700"
      },
      "message": "ipv6/udp: report SndbufErrors and RcvbufErrors\n\ncommit a18135eb9389 (Add UDP_MIB_{SND,RCV}BUFERRORS handling.)\nforgot to make the necessary changes in net/ipv6/proc.c to report\nadditional counters in /proc/net/snmp6\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1840897ab5d39b2e510c610ee262ded79919e718",
      "tree": "0b7fe95e3eda357d35b0d017f2b678b652307827",
      "parents": [
        "d56f84e7e317c69adefb2454a3d538a6d7e11e4b",
        "a4765fa7bfb92d5b9de19a503674b6624f95a7ae"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Oct 29 14:17:12 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Fri Oct 29 14:17:12 2010 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (34 commits)\n  b43: Fix warning at drivers/mmc/core/core.c:237 in mmc_wait_for_cmd\n  mac80211: fix failure to check kmalloc return value in key_key_read\n  libertas: Fix sd8686 firmware reload\n  ath9k: Fix incorrect access of rate flags in RC\n  netfilter: xt_socket: Make tproto signed in socket_mt6_v1().\n  stmmac: enable/disable rx/tx in the core with a single write.\n  net: atarilance - flags should be unsigned long\n  netxen: fix kdump\n  pktgen: Limit how much data we copy onto the stack.\n  net: Limit socket I/O iovec total length to INT_MAX.\n  USB: gadget: fix ethernet gadget crash in gether_setup\n  fib: Fix fib zone and its hash leak on namespace stop\n  cxgb3: Fix panic in free_tx_desc()\n  cxgb3: fix crash due to manipulating queues before registration\n  8390: Don\u0027t oops on starting dev queue\n  dccp ccid-2: Stop polling\n  dccp: Refine the wait-for-ccid mechanism\n  dccp: Extend CCID packet dequeueing interface\n  dccp: Return-value convention of hc_tx_send_packet()\n  igbvf: fix panic on load\n  ...\n"
    },
    {
      "commit": "a4765fa7bfb92d5b9de19a503674b6624f95a7ae",
      "tree": "27fa2b40b2fb4843043cc1583cd139844ee3f5fe",
      "parents": [
        "089282fb028198169a0f62f8f833ab6d06bdbb3c",
        "9f2a0fac625bcef9c579bcf0b0c904ab1a56e7c4"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Oct 29 12:23:15 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Oct 29 12:23:15 2010 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "520efd1ace3f826120482e57a95d649b4e1c1684",
      "tree": "04445d2fde489b7b7a3d8fa4898a0731817f6ca0",
      "parents": [
        "731b2034999bbfe86c9074f1b0d611940bf7c323"
      ],
      "author": {
        "name": "Jesper Juhl",
        "email": "jj@chaosbits.net",
        "time": "Fri Oct 29 16:10:26 2010 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Fri Oct 29 14:33:26 2010 -0400"
      },
      "message": "mac80211: fix failure to check kmalloc return value in key_key_read\n\nI noticed two small issues in mac80211/debugfs_key.c::key_key_read while\nreading through the code. Patch below.\n\nThe key_key_read() function returns ssize_t and the value that\u0027s actually\nreturned is the return value of simple_read_from_buffer() which also\nreturns ssize_t, so let\u0027s hold the return value in a ssize_t local\nvariable rather than a int one.\n\nAlso, memory is allocated dynamically with kmalloc() which can fail, but\nthe return value of kmalloc() is not checked, so we may end up operating\non a null pointer further on. So check for a NULL return and bail out with\n-ENOMEM in that case.\n\nSigned-off-by: Jesper Juhl \u003cjj@chaosbits.net\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "d817d29d0b37290d90b3a9e2a61162f1dbf2be4f",
      "tree": "7414a1334cdac82a61340623a23109c3222f4a48",
      "parents": [
        "64e46749224aa658d8fc0d37ea83ab20b1d7955d"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Fri Oct 29 19:59:40 2010 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Fri Oct 29 19:59:40 2010 +0200"
      },
      "message": "netfilter: fix nf_conntrack_l4proto_register()\n\nWhile doing __rcu annotations work on net/netfilter I found following\nbug. On some arches, it is possible we publish a table while its content\nis not yet committed to memory, and lockless reader can dereference wild\npointer.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "64e46749224aa658d8fc0d37ea83ab20b1d7955d",
      "tree": "ac3bbe77967718ba3022c58dbbe47142ee77c6f8",
      "parents": [
        "6b1686a71e3158d3c5f125260effce171cc7852b"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Fri Oct 29 16:28:07 2010 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Fri Oct 29 16:28:07 2010 +0200"
      },
      "message": "netfilter: nf_nat: fix compiler warning with CONFIG_NF_CT_NETLINK\u003dn\n\nnet/ipv4/netfilter/nf_nat_core.c:52: warning: \u0027nf_nat_proto_find_get\u0027 defined but not used\nnet/ipv4/netfilter/nf_nat_core.c:66: warning: \u0027nf_nat_proto_put\u0027 defined but not used\n\nReported-by: Geert Uytterhoeven \u003cgeert@linux-m68k.org\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "51139adac92f7160ad3ca1cab2de1b4b8d19dc96",
      "tree": "ea12df0927809e8d5333e82d51cbdb96288c9e6b",
      "parents": [
        "3c26ff6e499ee7e6f9f2bc7da5f2f30d80862ecf"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Sun Jul 25 23:47:46 2010 +0400"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Fri Oct 29 04:16:33 2010 -0400"
      },
      "message": "convert get_sb_pseudo() users\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "fc14f2fef682df677d64a145256dbd263df2aa7b",
      "tree": "74f6b939fbad959a43c04ec646cd0adc8af5f53a",
      "parents": [
        "848b83a59b772b8f102bc5e3f1187c2fa5676959"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Sun Jul 25 01:48:30 2010 +0400"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Fri Oct 29 04:16:28 2010 -0400"
      },
      "message": "convert get_sb_single() users\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "089282fb028198169a0f62f8f833ab6d06bdbb3c",
      "tree": "ad5377fa1310bdf3e8c24694ac729eba4cdada0c",
      "parents": [
        "19449bfc10d163f0024dd5ae5808e28cda32e7b4"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 28 12:59:53 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 28 12:59:53 2010 -0700"
      },
      "message": "netfilter: xt_socket: Make tproto signed in socket_mt6_v1().\n\nOtherwise error indications from ipv6_find_hdr() won\u0027t be noticed.\n\nThis required making the protocol argument to extract_icmp6_fields()\nsigned too.\n\nReported-by: Geert Uytterhoeven \u003cgeert@linux-m68k.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "448d7b5daf043d109df98e3e8f8deb165c2e8896",
      "tree": "475844d92c01fae639bda19988ba1375272c857a",
      "parents": [
        "8acfe468b0384e834a303f08ebc4953d72fb690a"
      ],
      "author": {
        "name": "Nelson Elhage",
        "email": "nelhage@ksplice.com",
        "time": "Thu Oct 28 11:31:07 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 28 11:47:53 2010 -0700"
      },
      "message": "pktgen: Limit how much data we copy onto the stack.\n\nA program that accidentally writes too much data to the pktgen file can overflow\nthe kernel stack and oops the machine. This is only triggerable by root, so\nthere\u0027s no security issue, but it\u0027s still an unfortunate bug.\n\nprintk() won\u0027t print more than 1024 bytes in a single call, anyways, so let\u0027s\njust never copy more than that much data. We\u0027re on a fairly shallow stack, so\nthat should be safe even with CONFIG_4KSTACKS.\n\nSigned-off-by: Nelson Elhage \u003cnelhage@ksplice.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8acfe468b0384e834a303f08ebc4953d72fb690a",
      "tree": "7ecee335efdbd283a122bcba1d5d9b533906142a",
      "parents": [
        "349f6c5c5d827db909a69e5b9e844e8623c8e881"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 28 11:41:55 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 28 11:47:52 2010 -0700"
      },
      "message": "net: Limit socket I/O iovec total length to INT_MAX.\n\nThis helps protect us from overflow issues down in the\nindividual protocol sendmsg/recvmsg handlers.  Once\nwe hit INT_MAX we truncate out the rest of the iovec\nby setting the iov_len members to zero.\n\nThis works because:\n\n1) For SOCK_STREAM and SOCK_SEQPACKET sockets, partial\n   writes are allowed and the application will just continue\n   with another write to send the rest of the data.\n\n2) For datagram oriented sockets, where there must be a\n   one-to-one correspondance between write() calls and\n   packets on the wire, INT_MAX is going to be far larger\n   than the packet size limit the protocol is going to\n   check for and signal with -EMSGSIZE.\n\nBased upon a patch by Linus Torvalds.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4aa2c466a7733af093a526e9d1cdd0b3b90d47e9",
      "tree": "093d99b6c728867a8eb9548463d94661e3d0799e",
      "parents": [
        "b1424ed91076db0b19ba4141856150df9b717dde"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@parallels.com",
        "time": "Thu Oct 28 02:00:43 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 28 10:27:03 2010 -0700"
      },
      "message": "fib: Fix fib zone and its hash leak on namespace stop\n\nWhen we stop a namespace we flush the table and free one, but the\nadded fn_zone-s (and their hashes if grown) are leaked. Need to free.\nTries releases all its stuff in the flushing code.\n\nShame on us - this bug exists since the very first make-fib-per-net\npatches in 2.6.27 :(\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1c0e0a0569e925220c2948ea9b92fc013895917f",
      "tree": "533f97f037679a7ba92867baf816dda21a3c9f84",
      "parents": [
        "b1fcf55eea541af9efa5d39f5a0d1aec8ceca55d"
      ],
      "author": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Oct 27 19:16:28 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 28 10:27:01 2010 -0700"
      },
      "message": "dccp ccid-2: Stop polling\n\nThis updates CCID-2 to use the CCID dequeuing mechanism, converting from\nprevious continuous-polling to a now event-driven mechanism.\n\nSigned-off-by: Gerrit Renker \u003cgerrit@erg.abdn.ac.uk\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b1fcf55eea541af9efa5d39f5a0d1aec8ceca55d",
      "tree": "a021b6abde9c784d67ee0de3bb7fb31f7d5b2e9f",
      "parents": [
        "dc841e30eaea9f9f83c9ab1ee0b3ef9e5c95ce8a"
      ],
      "author": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Oct 27 19:16:27 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 28 10:27:01 2010 -0700"
      },
      "message": "dccp: Refine the wait-for-ccid mechanism\n\nThis extends the existing wait-for-ccid routine so that it may be used with\ndifferent types of CCID, addressing the following problems:\n\n 1) The queue-drain mechanism only works with rate-based CCIDs. If CCID-2 for\n    example has a full TX queue and becomes network-limited just as the\n    application wants to close, then waiting for CCID-2 to become unblocked\n    could lead to an indefinite  delay (i.e., application \"hangs\").\n 2) Since each TX CCID in turn uses a feedback mechanism, there may be changes\n    in its sending policy while the queue is being drained. This can lead to\n    further delays during which the application will not be able to terminate.\n 3) The minimum wait time for CCID-3/4 can be expected to be the queue length\n    times the current inter-packet delay. For example if tx_qlen\u003d100 and a delay\n    of 15 ms is used for each packet, then the application would have to wait\n    for a minimum of 1.5 seconds before being allowed to exit.\n 4) There is no way for the user/application to control this behaviour. It would\n    be good to use the timeout argument of dccp_close() as an upper bound. Then\n    the maximum time that an application is willing to wait for its CCIDs to can\n    be set via the SO_LINGER option.\n\nThese problems are addressed by giving the CCID a grace period of up to the\n`timeout\u0027 value.\n\nThe wait-for-ccid function is, as before, used when the application\n (a) has read all the data in its receive buffer and\n (b) if SO_LINGER was set with a non-zero linger time, or\n (c) the socket is either in the OPEN (active close) or in the PASSIVE_CLOSEREQ\n     state (client application closes after receiving CloseReq).\n\nIn addition, there is a catch-all case of __skb_queue_purge() after waiting for\nthe CCID. This is necessary since the write queue may still have data when\n (a) the host has been passively-closed,\n (b) abnormal termination (unread data, zero linger time),\n (c) wait-for-ccid could not finish within the given time limit.\n\nSigned-off-by: Gerrit Renker \u003cgerrit@erg.abdn.ac.uk\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "dc841e30eaea9f9f83c9ab1ee0b3ef9e5c95ce8a",
      "tree": "921458d0ea02f1478dbac9305c1925dbea8c0dd9",
      "parents": [
        "fe84f4140f0d24deca8591e38926b95cfd097e62"
      ],
      "author": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Oct 27 19:16:26 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 28 10:27:00 2010 -0700"
      },
      "message": "dccp: Extend CCID packet dequeueing interface\n\nThis extends the packet dequeuing interface of dccp_write_xmit() to allow\n 1. CCIDs to take care of timing when the next packet may be sent;\n 2. delayed sending (as before, with an inter-packet gap up to 65.535 seconds).\n\nThe main purpose is to take CCID-2 out of its polling mode (when it is network-\nlimited, it tries every millisecond to send, without interruption).\n\nThe mode of operation for (2) is as follows:\n * new packet is enqueued via dccp_sendmsg() \u003d\u003e dccp_write_xmit(),\n * ccid_hc_tx_send_packet() detects that it may not send (e.g. window full),\n * it signals this condition via `CCID_PACKET_WILL_DEQUEUE_LATER\u0027,\n * dccp_write_xmit() returns without further action;\n * after some time the wait-condition for CCID becomes true,\n * that CCID schedules the tasklet,\n * tasklet function calls ccid_hc_tx_send_packet() via dccp_write_xmit(),\n * since the wait-condition is now true, ccid_hc_tx_packet() returns \"send now\",\n * packet is sent, and possibly more (since dccp_write_xmit() loops).\n\nCode reuse: the taskled function calls dccp_write_xmit(), the timer function\n            reduces to a wrapper around the same code.\n\nSigned-off-by: Gerrit Renker \u003cgerrit@erg.abdn.ac.uk\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fe84f4140f0d24deca8591e38926b95cfd097e62",
      "tree": "5b4c809f131105fddb533776632ff1d546b604a7",
      "parents": [
        "de7fe7874dc55e8226245c50f07dec3c7b285044"
      ],
      "author": {
        "name": "Gerrit Renker",
        "email": "gerrit@erg.abdn.ac.uk",
        "time": "Wed Oct 27 19:16:25 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 28 10:27:00 2010 -0700"
      },
      "message": "dccp: Return-value convention of hc_tx_send_packet()\n\nThis patch reorganises the return value convention of the CCID TX sending\nfunction, to permit more flexible schemes, as required by subsequent patches.\n\nCurrently the convention is\n * values \u003c 0     mean error,\n * a value \u003d\u003d 0   means \"send now\", and\n * a value x \u003e 0  means \"send in x milliseconds\".\n\nThe patch provides symbolic constants and a function to interpret return values.\n\nIn addition, it caps the maximum positive return value to 0xFFFF milliseconds,\ncorresponding to 65.535 seconds.  This is possible since in CCID-3/4 the\nmaximum possible inter-packet gap is fixed at t_mbi \u003d 64 sec.\n\nSigned-off-by: Gerrit Renker \u003cgerrit@erg.abdn.ac.uk\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f6ac55b6c156cebf750376dc08e06ffdade82717",
      "tree": "fd173ac547ec84f90b56cf6d8a90f737b4b2748f",
      "parents": [
        "b165d60145b717261a0234f989c442c2b68b6ec0"
      ],
      "author": {
        "name": "Sanchit Garg",
        "email": "sancgarg@linux.vnet.ibm.com",
        "time": "Wed Oct 27 09:41:01 2010 +0530"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Thu Oct 28 09:08:49 2010 -0500"
      },
      "message": "net/9p: Return error on read with NULL buffer\n\nThis patch ensures that a read(fd, NULL, 10) returns  EFAULT on a 9p file.\n\nSigned-off-by: Sanchit Garg \u003csancgarg@linux.vnet.ibm.com\u003e\nSigned-off-by: Aneesh Kumar K.V \u003caneesh.kumar@linux.vnet.ibm.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "b165d60145b717261a0234f989c442c2b68b6ec0",
      "tree": "024f9f2c71ff85a806ed47cbbf451edeaa7111a5",
      "parents": [
        "7b3bb3fe166702b504f1068359c9550d3b277eaf"
      ],
      "author": {
        "name": "Venkateswararao Jujjuri (JV)",
        "email": "jvrao@linux.vnet.ibm.com",
        "time": "Fri Oct 22 10:13:12 2010 -0700"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Thu Oct 28 09:08:49 2010 -0500"
      },
      "message": "9p: Add datasync to client side TFSYNC/RFSYNC for dotl\n\nSYNOPSIS\n    size[4] Tfsync tag[2] fid[4] datasync[4]\n\n    size[4] Rfsync tag[2]\n\nDESCRIPTION\n\n    The Tfsync transaction transfers (\"flushes\") all modified in-core data of\n    file identified by fid to the disk device (or other  permanent  storage\n    device)  where that  file  resides.\n\n    If datasync flag is specified data will be fleshed but does not flush\n    modified metadata unless  that  metadata  is  needed  in order to allow a\n    subsequent data retrieval to be correctly handled.\n\nSigned-off-by: Venkateswararao Jujjuri \u003cjvrao@linux.vnet.ibm.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "7b3bb3fe166702b504f1068359c9550d3b277eaf",
      "tree": "8a3c8039f55126dbafb23a06d7b03a1e5abf3d24",
      "parents": [
        "877cb3d4dd73838adcc6b79f2a3d29b155e7ebbe"
      ],
      "author": {
        "name": "Aneesh Kumar K.V",
        "email": "aneesh.kumar@linux.vnet.ibm.com",
        "time": "Tue Oct 19 09:17:02 2010 +0530"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Thu Oct 28 09:08:49 2010 -0500"
      },
      "message": "net/9p: Return error if we fail to encode protocol data\n\nWe need to return error in case we fail to encode data in protocol buffer.\nThis patch also return error in case of a failed copy_from_user.\n\nSigned-off-by: Aneesh Kumar K.V \u003caneesh.kumar@linux.vnet.ibm.com\u003e\nSigned-off-by: Venkateswararao Jujjuri \u003cjvrao@linux.vnet.ibm.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "52f44e0d08ff1a065bf06615483c608163575cb1",
      "tree": "44292212cecafac6ed870812b882b9af545bdaa6",
      "parents": [
        "419b39561e698d73a42f8010655d22e0134486da"
      ],
      "author": {
        "name": "Venkateswararao Jujjuri (JV)",
        "email": "jvrao@linux.vnet.ibm.com",
        "time": "Wed Sep 29 18:33:41 2010 -0700"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Thu Oct 28 09:08:48 2010 -0500"
      },
      "message": "net/9p: Add waitq to VirtIO transport.\n\nIf there is not enough space for the PDU on the VirtIO ring, current\ncode returns -EIO propagating the error to user.\n\nThis patch introduced a wqit_queue on the channel, and lets the process\nwait on this queue until VirtIO ring frees up.\n\nSigned-off-by: Venkateswararao Jujjuri \u003cjvrao@linux.vnet.ibm.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "419b39561e698d73a42f8010655d22e0134486da",
      "tree": "76b6bd98dcaaa89d27b2d804d1ed67f049f070bd",
      "parents": [
        "329176cc2c50e63c580ddaabb385876db5af1360"
      ],
      "author": {
        "name": "Venkateswararao Jujjuri (JV)",
        "email": "jvrao@linux.vnet.ibm.com",
        "time": "Wed Sep 29 18:06:54 2010 -0700"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Thu Oct 28 09:08:48 2010 -0500"
      },
      "message": "[net/9p]Serialize virtqueue operations to make VirtIO transport SMP safe.\n\nSigned-off-by: Venkateswararao Jujjuri \u003cjvrao@linux.vnet.ibm.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "329176cc2c50e63c580ddaabb385876db5af1360",
      "tree": "c7a95364c6339f75d37e1b63890d94114cd1935e",
      "parents": [
        "368c09d2a303c39e9f37193b23e945e6754cf0a7"
      ],
      "author": {
        "name": "M. Mohan Kumar",
        "email": "mohan@in.ibm.com",
        "time": "Tue Sep 28 19:59:25 2010 +0530"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Thu Oct 28 09:08:48 2010 -0500"
      },
      "message": "9p: Implement TREADLINK operation for 9p2000.L\n\nSynopsis\n\n\tsize[4] TReadlink tag[2] fid[4]\n\tsize[4] RReadlink tag[2] target[s]\n\nDescription\n\tReadlink is used to return the contents of the symoblic link\n        referred by fid. Contents of symboic link is returned as a\n        response.\n\n\ttarget[s] - Contents of the symbolic link referred by fid.\n\nSigned-off-by: M. Mohan Kumar \u003cmohan@in.ibm.com\u003e\nReviewed-by: Aneesh Kumar K.V \u003caneesh.kumar@linux.vnet.ibm.com\u003e\nSigned-off-by: Venkateswararao Jujjuri \u003cjvrao@linux.vnet.ibm.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "1d769cd192fc8c4097b1e2cd41fdee6ba3d1b2af",
      "tree": "16fd71ff9178bbfe144a28a2e168c85fb541a11b",
      "parents": [
        "a099027c779068b834f335cfdc3f2bf10f531dd9"
      ],
      "author": {
        "name": "M. Mohan Kumar",
        "email": "mohan@in.ibm.com",
        "time": "Mon Sep 27 12:22:13 2010 +0530"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Thu Oct 28 09:08:47 2010 -0500"
      },
      "message": "9p: Implement TGETLOCK\n\nSynopsis\n\n    size[4] TGetlock tag[2] fid[4] getlock[n]\n    size[4] RGetlock tag[2] getlock[n]\n\nDescription\n\nTGetlock is used to test for the existence of byte range posix locks on a file\nidentified by given fid. The reply contains getlock structure. If the lock could\nbe placed it returns F_UNLCK in type field of getlock structure.  Otherwise it\nreturns the details of the conflicting locks in the getlock structure\n\n    getlock structure:\n      type[1] - Type of lock: F_RDLCK, F_WRLCK\n      start[8] - Starting offset for lock\n      length[8] - Number of bytes to check for the lock\n             If length is 0, check for lock in all bytes starting at the location\n            \u0027start\u0027 through to the end of file\n      pid[4] - PID of the process that wants to take lock/owns the task\n               in case of reply\n      client[4] - Client id of the system that owns the process which\n                  has the conflicting lock\n\nSigned-off-by: M. Mohan Kumar \u003cmohan@in.ibm.com\u003e\nSigned-off-by: Aneesh Kumar K.V \u003caneesh.kumar@linux.vnet.ibm.com\u003e\nSigned-off-by: Venkateswararao Jujjuri \u003cjvrao@linux.vnet.ibm.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "a099027c779068b834f335cfdc3f2bf10f531dd9",
      "tree": "eee43443cce85a03c13b1cfdd25bf451445cf78f",
      "parents": [
        "920e65dc6911da28a58e17f4b683302636fc6d8e"
      ],
      "author": {
        "name": "M. Mohan Kumar",
        "email": "mohan@in.ibm.com",
        "time": "Mon Sep 27 11:34:24 2010 +0530"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Thu Oct 28 09:08:47 2010 -0500"
      },
      "message": "9p: Implement TLOCK\n\nSynopsis\n\n    size[4] TLock tag[2] fid[4] flock[n]\n    size[4] RLock tag[2] status[1]\n\nDescription\n\nTlock is used to acquire/release byte range posix locks on a file\nidentified by given fid. The reply contains status of the lock request\n\n    flock structure:\n        type[1] - Type of lock: F_RDLCK, F_WRLCK, F_UNLCK\n        flags[4] - Flags could be either of\n          P9_LOCK_FLAGS_BLOCK - Blocked lock request, if there is a\n            conflicting lock exists, wait for that lock to be released.\n          P9_LOCK_FLAGS_RECLAIM - Reclaim lock request, used when client is\n            trying to reclaim a lock after a server restrart (due to crash)\n        start[8] - Starting offset for lock\n        length[8] - Number of bytes to lock\n          If length is 0, lock all bytes starting at the location \u0027start\u0027\n          through to the end of file\n        pid[4] - PID of the process that wants to take lock\n        client_id[4] - Unique client id\n\n        status[1] - Status of the lock request, can be\n          P9_LOCK_SUCCESS(0), P9_LOCK_BLOCKED(1), P9_LOCK_ERROR(2) or\n          P9_LOCK_GRACE(3)\n          P9_LOCK_SUCCESS - Request was successful\n          P9_LOCK_BLOCKED - A conflicting lock is held by another process\n          P9_LOCK_ERROR - Error while processing the lock request\n          P9_LOCK_GRACE - Server is in grace period, it can\u0027t accept new lock\n            requests in this period (except locks with\n            P9_LOCK_FLAGS_RECLAIM flag set)\n\nSigned-off-by: M. Mohan Kumar \u003cmohan@in.ibm.com\u003e\nSigned-off-by: Aneesh Kumar K.V \u003caneesh.kumar@linux.vnet.ibm.com\u003e\nSigned-off-by: Venkateswararao Jujjuri \u003cjvrao@linux.vnet.ibm.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "920e65dc6911da28a58e17f4b683302636fc6d8e",
      "tree": "761280ee48576a45d13df5df685ea6b9da7fd775",
      "parents": [
        "b04faaf3717307cd976a15667c8c24161c1d24ef"
      ],
      "author": {
        "name": "Venkateswararao Jujjuri (JV)",
        "email": "jvrao@linux.vnet.ibm.com",
        "time": "Wed Sep 22 17:19:19 2010 -0700"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Thu Oct 28 09:08:47 2010 -0500"
      },
      "message": "[9p] Introduce client side TFSYNC/RFSYNC for dotl.\n\nSYNOPSIS\n    size[4] Tfsync tag[2] fid[4]\n\n    size[4] Rfsync tag[2]\n\nDESCRIPTION\n\nThe Tfsync transaction transfers (\"flushes\") all modified in-core data of\nfile identified by fid to the disk device (or other  permanent  storage\ndevice)  where that  file  resides.\n\nSigned-off-by: Venkateswararao Jujjuri \u003cjvrao@linux.vnet.ibm.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "8e44a0805fc9d77475060280136aa491aa7d7060",
      "tree": "61680d097ea47eddd9fab5e8fbd12626baf25b20",
      "parents": [
        "8d40fa2492eb3dcf02468eef2f6bba450be42b22"
      ],
      "author": {
        "name": "jvrao",
        "email": "jvrao@linux.vnet.ibm.com",
        "time": "Wed Aug 25 16:27:06 2010 +0000"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Thu Oct 28 09:08:45 2010 -0500"
      },
      "message": "net/9p: Add a Warning to catch NULL fids passed to p9_client_clunk().\n\nSigned-off-by: Venkateswararao Jujjuri \u003cjvrao@linux.vnet.ibm.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "4f7ebe807242898ee08ed732d56982874442c304",
      "tree": "25d8cec6b3a487fb9b44b3af20179a6f7b5db36d",
      "parents": [
        "7c7298cffc8f4417c95117c2a432f962c066499d"
      ],
      "author": {
        "name": "Arun R Bharadwaj",
        "email": "arun@linux.vnet.ibm.com",
        "time": "Wed Jul 28 14:17:26 2010 +0530"
      },
      "committer": {
        "name": "Eric Van Hensbergen",
        "email": "ericvh@gmail.com",
        "time": "Thu Oct 28 09:08:45 2010 -0500"
      },
      "message": "net/9p: This patch implements TLERROR/RLERROR on the 9P client.\n\nSigned-off-by: Arun R Bharadwaj \u003carun@linux.vnet.ibm.com\u003e\nSigned-off-by: Venkateswararao Jujjuri \u003cjvrao@linux.vnet.ibm.com\u003e\nSigned-off-by: Eric Van Hensbergen \u003cericvh@gmail.com\u003e\n"
    },
    {
      "commit": "6b1686a71e3158d3c5f125260effce171cc7852b",
      "tree": "4769381428b5a6e2bd7673c62c6a30f65ac1a2d9",
      "parents": [
        "c1758012971e0410790b2bc96a77e26d7b286593"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Thu Oct 28 12:34:21 2010 +0200"
      },
      "committer": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Thu Oct 28 12:34:21 2010 +0200"
      },
      "message": "netfilter: nf_conntrack: allow nf_ct_alloc_hashtable() to get highmem pages\n\ncommit ea781f197d6a8 (use SLAB_DESTROY_BY_RCU and get rid of call_rcu())\ndid a mistake in __vmalloc() call in nf_ct_alloc_hashtable().\n\nI forgot to add __GFP_HIGHMEM, so pages were taken from LOWMEM only.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nCc: stable@kernel.org\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\n"
    },
    {
      "commit": "22cdbd1d5789cc16c37102eb6f62c3ae377b849e",
      "tree": "f86d3d798351c4bde69afbfa80e940aad01abaad",
      "parents": [
        "55f335a8857db2ee22c068e7ab7141fc79928296",
        "ce45b873028fdf94a24f0850cd554e6fda593e16"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Oct 27 18:28:00 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Wed Oct 27 18:28:00 2010 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6: (108 commits)\n  ehea: Fixing statistics\n  bonding: Fix lockdep warning after bond_vlan_rx_register()\n  tunnels: Fix tunnels change rcu protection\n  caif-u5500: Build config for CAIF shared mem driver\n  caif-u5500: CAIF shared memory mailbox interface\n  caif-u5500: CAIF shared memory transport protocol\n  caif-u5500: Adding shared memory include\n  drivers/isdn: delete double assignment\n  drivers/net/typhoon.c: delete double assignment\n  drivers/net/sb1000.c: delete double assignment\n  qlcnic: define valid vlan id range\n  qlcnic: reduce rx ring size\n  qlcnic: fix mac learning\n  ehea: fix use after free\n  inetpeer: __rcu annotations\n  fib_rules: __rcu annotates ctarget\n  tunnels: add __rcu annotations\n  net: add __rcu annotations to protocol\n  ipv4: add __rcu annotations to routes.c\n  qlge: bugfix: Restoring the vlan setting.\n  ...\n"
    },
    {
      "commit": "74b0b85b88aaa952023762e0280799aaae849841",
      "tree": "a3049c0efd6332785e2323581506c89d49c67538",
      "parents": [
        "1933f0c09438ed8ccfee2281b814d9b26cef336c"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@parallels.com",
        "time": "Wed Oct 27 05:43:53 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 27 14:20:08 2010 -0700"
      },
      "message": "tunnels: Fix tunnels change rcu protection\n\nAfter making rcu protection for tunnels (ipip, gre, sit and ip6) a bug\nwas introduced into the SIOCCHGTUNNEL code.\n\nThe tunnel is first unlinked, then addresses change, then it is linked\nback probably into another bucket. But while changing the parms, the\nhash table is unlocked to readers and they can lookup the improper tunnel.\n\nRespective commits are b7285b79 (ipip: get rid of ipip_lock), 1507850b\n(gre: get rid of ipgre_lock), 3a43be3c (sit: get rid of ipip6_lock) and\n94767632 (ip6tnl: get rid of ip6_tnl_lock).\n\nThe quick fix is to wait for quiescent state to pass after unlinking,\nbut if it is inappropriate I can invent something better, just let me\nknow.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nAcked-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "dc9f48ce7c7d345be31208def51572a8250a4a03",
      "tree": "c8989c1905d740bb49c1b186b909b8408c1a4315",
      "parents": [
        "d654567dec75782d6fd9add4b7b9c50e0926d369"
      ],
      "author": {
        "name": "Jouni Malinen",
        "email": "j@w1.fi",
        "time": "Wed Oct 27 13:40:33 2010 +0300"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Wed Oct 27 15:46:51 2010 -0400"
      },
      "message": "mac80211: Fix scan_ies_len to include DS Params\n\nCommit 651b52254fc061f02d965524e71de4333a009a5a added DS Parameter Set\ninformation into Probe Request frames that are transmitted on 2.4 GHz\nband, but it failed to increment local-\u003escan_ies_len to cover this new\ninformation. This variable needs to be updated to match the maximum IE\ndata length so that the extra buffer need gets reduced from the driver\nlimit.\n\nSigned-off-by: Jouni Malinen \u003cj@w1.fi\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "b914c4ea929a4ba6fb97967800dc473c31552b98",
      "tree": "630f7c81d82e580e5aa5164c0e4cf1d0dadca3ba",
      "parents": [
        "7a2b03c5175e9ddcc2a2d48ca86dea8a88b68383"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Mon Oct 25 23:55:38 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 27 11:37:33 2010 -0700"
      },
      "message": "inetpeer: __rcu annotations\n\nAdds __rcu annotations to inetpeer\n\t(struct inet_peer)-\u003eavl_left\n\t(struct inet_peer)-\u003eavl_right\n\nThis is a tedious cleanup, but removes one smp_wmb() from link_to_pool()\nsince we now use more self documenting rcu_assign_pointer().\n\nNote the use of RCU_INIT_POINTER() instead of rcu_assign_pointer() in\nall cases we dont need a memory barrier.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7a2b03c5175e9ddcc2a2d48ca86dea8a88b68383",
      "tree": "ccc580891d9d17e2482e2f3db2b2c8cf80bdf773",
      "parents": [
        "b33eab08445d86c3d0dec3111ce10df561328705"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Tue Oct 26 09:24:55 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 27 11:37:32 2010 -0700"
      },
      "message": "fib_rules: __rcu annotates ctarget\n\nAdds __rcu annotation to (struct fib_rule)-\u003ectarget\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b33eab08445d86c3d0dec3111ce10df561328705",
      "tree": "381a37141d4da9cf6cb3a8c8c37c6363d856f8e4",
      "parents": [
        "e0ad61ec867fdd262804afa7a68e11fc9930c2b9"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Mon Oct 25 21:01:26 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 27 11:37:32 2010 -0700"
      },
      "message": "tunnels: add __rcu annotations\n\nAdd __rcu annotations to :\n        (struct ip_tunnel)-\u003eprl\n        (struct ip_tunnel_prl_entry)-\u003enext\n        (struct xfrm_tunnel)-\u003enext\n\tstruct xfrm_tunnel *tunnel4_handlers\n\tstruct xfrm_tunnel *tunnel64_handlers\n\nAnd use appropriate rcu primitives to reduce sparse warnings if\nCONFIG_SPARSE_RCU_POINTER\u003dy\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e0ad61ec867fdd262804afa7a68e11fc9930c2b9",
      "tree": "f59451cdfa2086757e55b18b87167b0fef3de2c1",
      "parents": [
        "1c31720a74e19bb57f301350a3b03210fa2ba9e3"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Mon Oct 25 21:02:28 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 27 11:37:31 2010 -0700"
      },
      "message": "net: add __rcu annotations to protocol\n\nAdd __rcu annotations to :\n        struct net_protocol *inet_protos\n        struct net_protocol *inet6_protos\n\nAnd use appropriate casts to reduce sparse warnings if\nCONFIG_SPARSE_RCU_POINTER\u003dy\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1c31720a74e19bb57f301350a3b03210fa2ba9e3",
      "tree": "053f29ffa53383eb003ac632971f31e1643ef1d9",
      "parents": [
        "c1b60092cf307fef12f793abf7cf8167e26a6ccf"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Mon Oct 25 21:02:07 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 27 11:37:31 2010 -0700"
      },
      "message": "ipv4: add __rcu annotations to routes.c\n\nAdd __rcu annotations to :\n        (struct dst_entry)-\u003ert_next\n        (struct rt_hash_bucket)-\u003echain\n\nAnd use appropriate rcu primitives to reduce sparse warnings if\nCONFIG_SPARSE_RCU_POINTER\u003dy\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "853dc2e03ddd0c49885ed55c48755d2b1073122a",
      "tree": "04269eb6d7e502ee4db2b3658b0eef22c67d34eb",
      "parents": [
        "66c68bcc489fadd4f5e8839e966e3a366e50d1d5"
      ],
      "author": {
        "name": "Ursula Braun",
        "email": "ursula.braun@de.ibm.com",
        "time": "Sun Oct 24 23:06:43 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 27 11:37:30 2010 -0700"
      },
      "message": "ipv6: fix refcnt problem related to POSTDAD state\n\nAfter running this bonding setup script\n    modprobe bonding miimon\u003d100 mode\u003d0 max_bonds\u003d1\n    ifconfig bond0 10.1.1.1/16\n    ifenslave bond0 eth1\n    ifenslave bond0 eth3\non s390 with qeth-driven slaves, modprobe -r fails with this message\n    unregister_netdevice: waiting for bond0 to become free. Usage count \u003d 1\ndue to twice detection of duplicate address.\nProblem is caused by a missing decrease of ifp-\u003erefcnt in addrconf_dad_failure.\nAn extra call of in6_ifa_put(ifp) solves it.\nProblem has been introduced with commit f2344a131bccdbfc5338e17fa71a807dee7944fa.\n\nSigned-off-by: Ursula Braun \u003cursula.braun@de.ibm.com\u003e\nCc: David S. Miller \u003cdavem@davemloft.net\u003e\nCc: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "66c68bcc489fadd4f5e8839e966e3a366e50d1d5",
      "tree": "3491719cf7988e7ef11735ed64223a5fb386f2c6",
      "parents": [
        "af1905dbec44445d75851996819ac2203670bd0f"
      ],
      "author": {
        "name": "Ben Hutchings",
        "email": "bhutchings@solarflare.com",
        "time": "Fri Oct 22 04:38:26 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 27 11:37:29 2010 -0700"
      },
      "message": "net: NETIF_F_HW_CSUM does not imply FCoE CRC offload\n\nNETIF_F_HW_CSUM indicates the ability to update an TCP/IP-style 16-bit\nchecksum with the checksum of an arbitrary part of the packet data,\nwhereas the FCoE CRC is something entirely different.\n\nSigned-off-by: Ben Hutchings \u003cbhutchings@solarflare.com\u003e\nCc: stable@kernel.org [2.6.32+]\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "af1905dbec44445d75851996819ac2203670bd0f",
      "tree": "0b34c62feeda057f5cb7233875b2b14b4228b2f1",
      "parents": [
        "cd0ea2419544cfc4ccbf8ee0087d0d9f109852d2"
      ],
      "author": {
        "name": "Ben Hutchings",
        "email": "bhutchings@solarflare.com",
        "time": "Fri Oct 22 04:12:19 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 27 11:37:29 2010 -0700"
      },
      "message": "net: Fix some corner cases in dev_can_checksum()\n\ndev_can_checksum() incorrectly returns true in these cases:\n\n1. The skb has both out-of-band and in-band VLAN tags and the device\n   supports checksum offload for the encapsulated protocol but only with\n   one layer of encapsulation.\n2. The skb has a VLAN tag and the device supports generic checksumming\n   but not in conjunction with VLAN encapsulation.\n\nRearrange the VLAN tag checks to avoid these.\n\nSigned-off-by: Ben Hutchings \u003cbhutchings@solarflare.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "426e1f5cec4821945642230218876b0e89aafab1",
      "tree": "2728ace018d0698886989da586210ef1543a7098",
      "parents": [
        "9e5fca251f44832cb996961048ea977f80faf6ea",
        "63997e98a3be68d7cec806d22bf9b02b2e1daabb"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Oct 26 17:58:44 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Oct 26 17:58:44 2010 -0700"
      },
      "message": "Merge branch \u0027for-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs-2.6\n\n* \u0027for-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs-2.6: (52 commits)\n  split invalidate_inodes()\n  fs: skip I_FREEING inodes in writeback_sb_inodes\n  fs: fold invalidate_list into invalidate_inodes\n  fs: do not drop inode_lock in dispose_list\n  fs: inode split IO and LRU lists\n  fs: switch bdev inode bdi\u0027s correctly\n  fs: fix buffer invalidation in invalidate_list\n  fsnotify: use dget_parent\n  smbfs: use dget_parent\n  exportfs: use dget_parent\n  fs: use RCU read side protection in d_validate\n  fs: clean up dentry lru modification\n  fs: split __shrink_dcache_sb\n  fs: improve DCACHE_REFERENCED usage\n  fs: use percpu counter for nr_dentry and nr_dentry_unused\n  fs: simplify __d_free\n  fs: take dcache_lock inside __d_path\n  fs: do not assign default i_ino in new_inode\n  fs: introduce a per-cpu last_ino allocator\n  new helper: ihold()\n  ...\n"
    },
    {
      "commit": "518de9b39e854542de59bfb8b9f61c8f7ecf808b",
      "tree": "06cd1dd303a1526501783589ec61696570c0ffa8",
      "parents": [
        "571428be550fbe37160596995e96ad398873fcbd"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Tue Oct 26 14:22:44 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Oct 26 16:52:15 2010 -0700"
      },
      "message": "fs: allow for more than 2^31 files\n\nRobin Holt tried to boot a 16TB system and found af_unix was overflowing\na 32bit value :\n\n\u003cquote\u003e\n\nWe were seeing a failure which prevented boot.  The kernel was incapable\nof creating either a named pipe or unix domain socket.  This comes down\nto a common kernel function called unix_create1() which does:\n\n        atomic_inc(\u0026unix_nr_socks);\n        if (atomic_read(\u0026unix_nr_socks) \u003e 2 * get_max_files())\n                goto out;\n\nThe function get_max_files() is a simple return of files_stat.max_files.\nfiles_stat.max_files is a signed integer and is computed in\nfs/file_table.c\u0027s files_init().\n\n        n \u003d (mempages * (PAGE_SIZE / 1024)) / 10;\n        files_stat.max_files \u003d n;\n\nIn our case, mempages (total_ram_pages) is approx 3,758,096,384\n(0xe0000000).  That leaves max_files at approximately 1,503,238,553.\nThis causes 2 * get_max_files() to integer overflow.\n\n\u003c/quote\u003e\n\nFix is to let /proc/sys/fs/file-nr \u0026 /proc/sys/fs/file-max use long\nintegers, and change af_unix to use an atomic_long_t instead of atomic_t.\n\nget_max_files() is changed to return an unsigned long.  get_nr_files() is\nchanged to return a long.\n\nunix_nr_socks is changed from atomic_t to atomic_long_t, while not\nstrictly needed to address Robin problem.\n\nBefore patch (on a 64bit kernel) :\n# echo 2147483648 \u003e/proc/sys/fs/file-max\n# cat /proc/sys/fs/file-max\n-18446744071562067968\n\nAfter patch:\n# echo 2147483648 \u003e/proc/sys/fs/file-max\n# cat /proc/sys/fs/file-max\n2147483648\n# cat /proc/sys/fs/file-nr\n704     0       2147483648\n\nReported-by: Robin Holt \u003cholt@sgi.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nAcked-by: David Miller \u003cdavem@davemloft.net\u003e\nReviewed-by: Robin Holt \u003cholt@sgi.com\u003e\nTested-by: Robin Holt \u003cholt@sgi.com\u003e\nCc: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\nCc: Christoph Hellwig \u003chch@lst.de\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "7a876b0efcba3804da3051313445fa7be751cab7",
      "tree": "2135dfa1c8ffa8807e831d0817f49a31caf22cc2",
      "parents": [
        "aed65501e8c072b52c5b4dc807cd938659329673"
      ],
      "author": {
        "name": "Glenn Wurster",
        "email": "gwurster@scs.carleton.ca",
        "time": "Mon Sep 27 07:10:10 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Oct 26 12:35:13 2010 -0700"
      },
      "message": "IPv6: Temp addresses are immediately deleted.\n\nThere is a bug in the interaction between ipv6_create_tempaddr and\naddrconf_verify.  Because ipv6_create_tempaddr uses the cstamp and tstamp\nfrom the public address in creating a private address, if we have not\nreceived a router advertisement in a while, tstamp + temp_valid_lft might be\n\u003c now.  If this happens, the new address is created inside\nipv6_create_tempaddr, then the loop within addrconf_verify starts again and\nthe address is immediately deleted.  We are left with no temporary addresses\non the interface, and no more will be created until the public IP address is\nupdated.  To avoid this, set the expiry time to be the minimum of the time\nleft on the public address or the config option PLUS the current age of the\npublic interface.\n\nSigned-off-by: Glenn Wurster \u003cgwurster@scs.carleton.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "aed65501e8c072b52c5b4dc807cd938659329673",
      "tree": "c604168d37323a2ca02faee256cb0d21e9ccf578",
      "parents": [
        "ded85aa86bff953190cb893fceeecaadcab53a80"
      ],
      "author": {
        "name": "Glenn Wurster",
        "email": "gwurster@scs.carleton.ca",
        "time": "Mon Sep 27 07:04:30 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Oct 26 12:35:12 2010 -0700"
      },
      "message": "IPv6: Create temporary address if none exists.\n\nIf privacy extentions are enabled, but no current temporary address exists,\nthen create one when we get a router advertisement.\n\nSigned-off-by: Glenn Wurster \u003cgwurster@scs.carleton.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ded85aa86bff953190cb893fceeecaadcab53a80",
      "tree": "abbb2c614d4b1778c2afc34038ac06e0aac14381",
      "parents": [
        "ebb9fed2defa55f2ca91c8be582c59612e9940d1"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Tue Oct 26 03:24:16 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Oct 26 11:42:39 2010 -0700"
      },
      "message": "fib_hash: fix rcu sparse and logical errors\n\nWhile fixing CONFIG_SPARSE_RCU_POINTER errors, I had to fix accesses to\nfz-\u003efz_hash for real.\n\n-\t\u0026fz-\u003efz_hash[fn_hash(f-\u003efn_key, fz)]\n+\trcu_dereference(fz-\u003efz_hash) + fn_hash(f-\u003efn_key, fz)\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ebb9fed2defa55f2ca91c8be582c59612e9940d1",
      "tree": "00c749fb425cc1c30222d9911017849861ed2627",
      "parents": [
        "1941bf8c8d9392b18cd9bfed8050a2d78850aede"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Sat Oct 23 09:44:25 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Oct 26 11:42:38 2010 -0700"
      },
      "message": "fib: fix fib_nl_newrule()\n\nSome panic reports in fib_rules_lookup() show a rule could have a NULL\npointer as a next pointer in the rules_list.\n\nThis can actually happen because of a bug in fib_nl_newrule() : It\nchecks if current rule is the destination of unresolved gotos. (Other\nrules have gotos to this about to be inserted rule)\n\nProblem is it does the resolution of the gotos before the rule is\ninserted in the rules_list (and has a valid next pointer)\n\nFix this by moving the rules_list insertion before the changes on gotos.\n\nA lockless reader can not any more follow a ctarget pointer, unless\ndestination is ready (has a valid next pointer)\n\nReported-by: Oleg A. Arkhangelsky \u003csysoleg@yandex.ru\u003e\nReported-by: Joe Buehler \u003caspam@cox.net\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "78fd9c4491a9c4cf8b401f1c5a516d3d28d3b42b",
      "tree": "aa65a89a09cd28f7b305c4f27a47903996b5b365",
      "parents": [
        "b9958a951ed4f8adff9ce02c2b1cb4ede8e2aa0e",
        "822395b591db32ad3cf8a5b57b0fe30fb8d12c37"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Oct 26 11:32:28 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Oct 26 11:32:28 2010 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/linville/wireless-2.6\n"
    },
    {
      "commit": "4390110fef9e5c64e10c6ca19d586932242c9a8a",
      "tree": "f2f26fe291c8b4e424b97ac57370b33e0c006568",
      "parents": [
        "a4dd8dce14014665862ce7911b38cb2c69e366dd",
        "42d7ba3d6d56a6cbc773284896108b1e2ebcee81"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Oct 26 09:55:25 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Oct 26 09:55:25 2010 -0700"
      },
      "message": "Merge branch \u0027for-2.6.37\u0027 of git://linux-nfs.org/~bfields/linux\n\n* \u0027for-2.6.37\u0027 of git://linux-nfs.org/~bfields/linux: (99 commits)\n  svcrpc: svc_tcp_sendto XPT_DEAD check is redundant\n  svcrpc: no need for XPT_DEAD check in svc_xprt_enqueue\n  svcrpc: assume svc_delete_xprt() called only once\n  svcrpc: never clear XPT_BUSY on dead xprt\n  nfsd4: fix connection allocation in sequence()\n  nfsd4: only require krb5 principal for NFSv4.0 callbacks\n  nfsd4: move minorversion to client\n  nfsd4: delay session removal till free_client\n  nfsd4: separate callback change and callback probe\n  nfsd4: callback program number is per-session\n  nfsd4: track backchannel connections\n  nfsd4: confirm only on succesful create_session\n  nfsd4: make backchannel sequence number per-session\n  nfsd4: use client pointer to backchannel session\n  nfsd4: move callback setup into session init code\n  nfsd4: don\u0027t cache seq_misordered replies\n  SUNRPC: Properly initialize sock_xprt.srcaddr in all cases\n  SUNRPC: Use conventional switch statement when reclassifying sockets\n  sunrpc/xprtrdma: clean up workqueue usage\n  sunrpc: Turn list_for_each-s into the ..._entry-s\n  ...\n\nFix up trivial conflicts (two different deprecation notices added in\nseparate branches) in Documentation/feature-removal-schedule.txt\n"
    },
    {
      "commit": "a4dd8dce14014665862ce7911b38cb2c69e366dd",
      "tree": "00e79b2845d5d49abcd83cf253db83a52d482265",
      "parents": [
        "b18cae4224bde7e5a332c19bc99247b2098ea232",
        "411b5e05617593efebc06241dbc56f42150f2abe"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Oct 26 09:52:09 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Oct 26 09:52:09 2010 -0700"
      },
      "message": "Merge branch \u0027nfs-for-2.6.37\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6\n\n* \u0027nfs-for-2.6.37\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6:\n  net/sunrpc: Use static const char arrays\n  nfs4: fix channel attribute sanity-checks\n  NFSv4.1: Use more sensible names for \u0027initialize_mountpoint\u0027\n  NFSv4.1: pnfs: filelayout: add driver\u0027s LAYOUTGET and GETDEVICEINFO infrastructure\n  NFSv4.1: pnfs: add LAYOUTGET and GETDEVICEINFO infrastructure\n  NFS: client needs to maintain list of inodes with active layouts\n  NFS: create and destroy inode\u0027s layout cache\n  NFSv4.1: pnfs: filelayout: introduce minimal file layout driver\n  NFSv4.1: pnfs: full mount/umount infrastructure\n  NFS: set layout driver\n  NFS: ask for layouttypes during v4 fsinfo call\n  NFS: change stateid to be a union\n  NFSv4.1: pnfsd, pnfs: protocol level pnfs constants\n  SUNRPC: define xdr_decode_opaque_fixed\n  NFSD: remove duplicate NFS4_STATEID_SIZE\n"
    },
    {
      "commit": "7932c2e55c707350ac166effea2f49afe2e47400",
      "tree": "875bba102f539fc138c4d8979e620f02d5c8ed07",
      "parents": [
        "10d8c4638c5a797baad5846a3447c0ccca8986a3"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Oct 26 09:08:53 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Oct 26 09:08:53 2010 -0700"
      },
      "message": "netfilter: Add missing CONFIG_SYSCTL checks in ipv6\u0027s nf_conntrack_reasm.c\n\nReported-by: Randy Dunlap \u003crandy.dunlap@oracle.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "411b5e05617593efebc06241dbc56f42150f2abe",
      "tree": "f3a8ea3a580134cee82f06cf23a0e1cbdc4f3f41",
      "parents": [
        "43c2e885be25311e6289c7da52e8a03c4453ee03"
      ],
      "author": {
        "name": "Joe Perches",
        "email": "joe@perches.com",
        "time": "Mon Sep 13 12:48:01 2010 -0700"
      },
      "committer": {
        "name": "Trond Myklebust",
        "email": "Trond.Myklebust@netapp.com",
        "time": "Mon Oct 25 22:19:52 2010 -0400"
      },
      "message": "net/sunrpc: Use static const char arrays\n\nSigned-off-by: Joe Perches \u003cjoe@perches.com\u003e\nSigned-off-by: Trond Myklebust \u003cTrond.Myklebust@netapp.com\u003e\n"
    },
    {
      "commit": "85fe4025c616a7c0ed07bc2fc8c5371b07f3888c",
      "tree": "7a5db7accb6192f2911f2473b4e3191227b914cc",
      "parents": [
        "f991bd2e14210fb93d722cb23e54991de20e8a3d"
      ],
      "author": {
        "name": "Christoph Hellwig",
        "email": "hch@lst.de",
        "time": "Sat Oct 23 11:19:54 2010 -0400"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Mon Oct 25 21:26:11 2010 -0400"
      },
      "message": "fs: do not assign default i_ino in new_inode\n\nInstead of always assigning an increasing inode number in new_inode\nmove the call to assign it into those callers that actually need it.\nFor now callers that need it is estimated conservatively, that is\nthe call is added to all filesystems that do not assign an i_ino\nby themselves.  For a few more filesystems we can avoid assigning\nany inode number given that they aren\u0027t user visible, and for others\nit could be done lazily when an inode number is actually needed,\nbut that\u0027s left for later patches.\n\nSigned-off-by: Christoph Hellwig \u003chch@lst.de\u003e\nSigned-off-by: Dave Chinner \u003cdchinner@redhat.com\u003e\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "7de9c6ee3ecffd99e1628e81a5ea5468f7581a1f",
      "tree": "88787e77ba8a253d0a26aeda4bd5e58532d592e0",
      "parents": [
        "646ec4615cd05972581c9c5342ed7a1e77df17bb"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Sat Oct 23 11:11:40 2010 -0400"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Mon Oct 25 21:26:11 2010 -0400"
      },
      "message": "new helper: ihold()\n\nClones an existing reference to inode; caller must already hold one.\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "7e360c38abe2c70eae3ba5a8a17f17671d8b77c5",
      "tree": "319034360c667ac704bce87b1a0856657bf67e4b",
      "parents": [
        "fde214d414218fb6cace35708730986bcc94fb53"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Tue Oct 05 09:32:55 2010 +0200"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Mon Oct 25 21:18:20 2010 -0400"
      },
      "message": "fs: allow for more than 2^31 files\n\nAndrew,\n\nCould you please review this patch, you probably are the right guy to\ntake it, because it crosses fs and net trees.\n\nNote : /proc/sys/fs/file-nr is a read-only file, so this patch doesnt\ndepend on previous patch (sysctl: fix min/max handling in\n__do_proc_doulongvec_minmax())\n\nThanks !\n\n[PATCH V4] fs: allow for more than 2^31 files\n\nRobin Holt tried to boot a 16TB system and found af_unix was overflowing\na 32bit value :\n\n\u003cquote\u003e\n\nWe were seeing a failure which prevented boot.  The kernel was incapable\nof creating either a named pipe or unix domain socket.  This comes down\nto a common kernel function called unix_create1() which does:\n\n        atomic_inc(\u0026unix_nr_socks);\n        if (atomic_read(\u0026unix_nr_socks) \u003e 2 * get_max_files())\n                goto out;\n\nThe function get_max_files() is a simple return of files_stat.max_files.\nfiles_stat.max_files is a signed integer and is computed in\nfs/file_table.c\u0027s files_init().\n\n        n \u003d (mempages * (PAGE_SIZE / 1024)) / 10;\n        files_stat.max_files \u003d n;\n\nIn our case, mempages (total_ram_pages) is approx 3,758,096,384\n(0xe0000000).  That leaves max_files at approximately 1,503,238,553.\nThis causes 2 * get_max_files() to integer overflow.\n\n\u003c/quote\u003e\n\nFix is to let /proc/sys/fs/file-nr \u0026 /proc/sys/fs/file-max use long\nintegers, and change af_unix to use an atomic_long_t instead of\natomic_t.\n\nget_max_files() is changed to return an unsigned long.\nget_nr_files() is changed to return a long.\n\nunix_nr_socks is changed from atomic_t to atomic_long_t, while not\nstrictly needed to address Robin problem.\n\nBefore patch (on a 64bit kernel) :\n# echo 2147483648 \u003e/proc/sys/fs/file-max\n# cat /proc/sys/fs/file-max\n-18446744071562067968\n\nAfter patch:\n# echo 2147483648 \u003e/proc/sys/fs/file-max\n# cat /proc/sys/fs/file-max\n2147483648\n# cat /proc/sys/fs/file-nr\n704     0       2147483648\n\nReported-by: Robin Holt \u003cholt@sgi.com\u003e\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nAcked-by: David Miller \u003cdavem@davemloft.net\u003e\nReviewed-by: Robin Holt \u003cholt@sgi.com\u003e\nTested-by: Robin Holt \u003cholt@sgi.com\u003e\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "42d7ba3d6d56a6cbc773284896108b1e2ebcee81",
      "tree": "3d0d908c39ae228e4b51c3bec8d5bd5188397637",
      "parents": [
        "01dba075d571f5a8b7dcb153fdfd14e981c4cee3"
      ],
      "author": {
        "name": "J. Bruce Fields",
        "email": "bfields@redhat.com",
        "time": "Sat Oct 23 11:55:53 2010 -0400"
      },
      "committer": {
        "name": "J. Bruce Fields",
        "email": "bfields@redhat.com",
        "time": "Mon Oct 25 17:59:34 2010 -0400"
      },
      "message": "svcrpc: svc_tcp_sendto XPT_DEAD check is redundant\n\nThe only caller (svc_send) has already checked XPT_DEAD.\n\nSigned-off-by: J. Bruce Fields \u003cbfields@redhat.com\u003e\n"
    },
    {
      "commit": "01dba075d571f5a8b7dcb153fdfd14e981c4cee3",
      "tree": "b443dff71fd4addcd11b873f356bbd247cadaa43",
      "parents": [
        "ac9303eb74471bc2567960b47497a8bfbe1e5a03"
      ],
      "author": {
        "name": "J. Bruce Fields",
        "email": "bfields@redhat.com",
        "time": "Sat Oct 23 11:23:46 2010 -0400"
      },
      "committer": {
        "name": "J. Bruce Fields",
        "email": "bfields@redhat.com",
        "time": "Mon Oct 25 17:59:33 2010 -0400"
      },
      "message": "svcrpc: no need for XPT_DEAD check in svc_xprt_enqueue\n\nIf any xprt marked DEAD is also left BUSY for the rest of its life, then\nthe XPT_DEAD check here is superfluous--we\u0027ll get the same result from\nthe XPT_BUSY check just after.\n\nSigned-off-by: J. Bruce Fields \u003cbfields@redhat.com\u003e\n"
    },
    {
      "commit": "ac9303eb74471bc2567960b47497a8bfbe1e5a03",
      "tree": "17f9882d81b56d2787d0c556cfa6d76ea40a948b",
      "parents": [
        "7e4fdd0744fcb9f08854c37643bf529c5945cc36"
      ],
      "author": {
        "name": "J. Bruce Fields",
        "email": "bfields@redhat.com",
        "time": "Sat Oct 23 11:16:10 2010 -0400"
      },
      "committer": {
        "name": "J. Bruce Fields",
        "email": "bfields@redhat.com",
        "time": "Mon Oct 25 17:59:32 2010 -0400"
      },
      "message": "svcrpc: assume svc_delete_xprt() called only once\n\nAs long as DEAD exports are left BUSY, and svc_delete_xprt is called\nonly with BUSY held, then svc_delete_xprt() will never be called on an\nxprt that is already DEAD.\n\nSigned-off-by: J. Bruce Fields \u003cbfields@redhat.com\u003e\n"
    },
    {
      "commit": "7e4fdd0744fcb9f08854c37643bf529c5945cc36",
      "tree": "4587d216b75107bc173a66396e5ca6a4d4e1b0ce",
      "parents": [
        "a663bdd8c5d18d287f7468470816c9e0e66343c1"
      ],
      "author": {
        "name": "J. Bruce Fields",
        "email": "bfields@redhat.com",
        "time": "Sat Oct 23 11:04:12 2010 -0400"
      },
      "committer": {
        "name": "J. Bruce Fields",
        "email": "bfields@redhat.com",
        "time": "Mon Oct 25 17:58:40 2010 -0400"
      },
      "message": "svcrpc: never clear XPT_BUSY on dead xprt\n\nOnce an xprt has been deleted, there\u0027s no reason to allow it to be\nenqueued--at worst, that might cause the xprt to be re-added to some\nglobal list, resulting in later corruption.\n\nAlso, note this leaves us with no need for the reference-count\nmanipulation here.\n\nReviewed-by: NeilBrown \u003cneilb@suse.de\u003e\nSigned-off-by: J. Bruce Fields \u003cbfields@redhat.com\u003e\n"
    },
    {
      "commit": "43a951e9994fd218ab4e641f94a2fc53556c3675",
      "tree": "497fe39185131f1d729c980c264562ff5cab86e8",
      "parents": [
        "0d7da9ddd9a4eb7808698d04b98bf9d62d02649b"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Mon Oct 25 03:32:44 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 25 14:18:28 2010 -0700"
      },
      "message": "ipv4: add __rcu annotations to ip_ra_chain\n\nAdd __rcu annotations to :\n        (struct ip_ra_chain)-\u003enext\n\tstruct ip_ra_chain *ip_ra_chain;\n\nAnd use appropriate rcu primitives.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0d7da9ddd9a4eb7808698d04b98bf9d62d02649b",
      "tree": "b170122c08d47be35a056782be54573ba19fe0b0",
      "parents": [
        "1c87733d0682547050ccccb400cdac425fa43b39"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Mon Oct 25 03:47:05 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 25 14:18:28 2010 -0700"
      },
      "message": "net: add __rcu annotation to sk_filter\n\nAdd __rcu annotation to :\n        (struct sock)-\u003esk_filter\n\nAnd use appropriate rcu primitives to reduce sparse warnings if\nCONFIG_SPARSE_RCU_POINTER\u003dy\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1c87733d0682547050ccccb400cdac425fa43b39",
      "tree": "8ec9de7722a2be0e97d9ad6a04d12fb0d298b201",
      "parents": [
        "6e3f7faf3e8a3e226b1a6b955aac12abf2f2e1b6"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Mon Oct 25 03:20:11 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 25 14:18:27 2010 -0700"
      },
      "message": "net_ns: add __rcu annotations\n\nadd __rcu annotation to (struct net)-\u003egen, and use\nrcu_dereference_protected() in net_assign_generic()\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6e3f7faf3e8a3e226b1a6b955aac12abf2f2e1b6",
      "tree": "a2ff2fe9f86ff561d62ceac56e8fe18d7b6f14a0",
      "parents": [
        "f6318e558806c925029dc101f14874be9f9fa78f"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Mon Oct 25 03:02:02 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 25 14:18:27 2010 -0700"
      },
      "message": "rps: add __rcu annotations\n\nAdd __rcu annotations to :\n\t(struct netdev_rx_queue)-\u003erps_map\n\t(struct netdev_rx_queue)-\u003erps_flow_table\n\tstruct rps_sock_flow_table *rps_sock_flow_table;\n\nAnd use appropriate rcu primitives.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f6318e558806c925029dc101f14874be9f9fa78f",
      "tree": "995a09d340c55a01a4d1b6235c3a8efea6b8a14f",
      "parents": [
        "6f0bcf152582e7403155627a38e07bf3ef7f3cf5"
      ],
      "author": {
        "name": "KOVACS Krisztian",
        "email": "hidden@balabit.hu",
        "time": "Sun Oct 24 23:38:32 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 25 13:58:36 2010 -0700"
      },
      "message": "netfilter: fix module dependency issues with IPv6 defragmentation, ip6tables and xt_TPROXY\n\nOne of the previous tproxy related patches split IPv6 defragmentation and\nconnection tracking, but did not correctly add Kconfig stanzas to handle the\nnew dependencies correctly. This patch fixes that by making the config options\nmirror the setup we have for IPv4: a distinct config option for defragmentation\nthat is automatically selected by both connection tracking and\nxt_TPROXY/xt_socket.\n\nThe patch also changes the #ifdefs enclosing IPv6 specific code in xt_socket\nand xt_TPROXY: we only compile these in case we have ip6tables support enabled.\n\nSigned-off-by: KOVACS Krisztian \u003chidden@balabit.hu\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "74eb94b218d087798a52c0b4f1379b635287a4b8",
      "tree": "4e467c3014c2b1169f6f71d88cf5d1598f3ce28e",
      "parents": [
        "7b6181e06841f5ad15c4ff708b967b4db65a64de",
        "9a84d38031c258a17bb39beed1e500eadee67407"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Oct 25 13:48:29 2010 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Mon Oct 25 13:48:29 2010 -0700"
      },
      "message": "Merge branch \u0027nfs-for-2.6.37\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6\n\n* \u0027nfs-for-2.6.37\u0027 of git://git.linux-nfs.org/projects/trondmy/nfs-2.6: (67 commits)\n  SUNRPC: Cleanup duplicate assignment in rpcauth_refreshcred\n  nfs: fix unchecked value\n  Ask for time_delta during fsinfo probe\n  Revalidate caches on lock\n  SUNRPC: After calling xprt_release(), we must restart from call_reserve\n  NFSv4: Fix up the \u0027dircount\u0027 hint in encode_readdir\n  NFSv4: Clean up nfs4_decode_dirent\n  NFSv4: nfs4_decode_dirent must clear entry-\u003efattr-\u003evalid\n  NFSv4: Fix a regression in decode_getfattr\n  NFSv4: Fix up decode_attr_filehandle() to handle the case of empty fh pointer\n  NFS: Ensure we check all allocation return values in new readdir code\n  NFS: Readdir plus in v4\n  NFS: introduce generic decode_getattr function\n  NFS: check xdr_decode for errors\n  NFS: nfs_readdir_filler catch all errors\n  NFS: readdir with vmapped pages\n  NFS: remove page size checking code\n  NFS: decode_dirent should use an xdr_stream\n  SUNRPC: Add a helper function xdr_inline_peek\n  NFS: remove readdir plus limit\n  ...\n"
    },
    {
      "commit": "6f0bcf152582e7403155627a38e07bf3ef7f3cf5",
      "tree": "0dafb9ea61fa01bb8850ee2bcce97b98c23a7c8f",
      "parents": [
        "3cc77ec74e1583b50b8405114cdbd6b8ebb8c474"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Sun Oct 24 21:33:16 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 25 13:09:45 2010 -0700"
      },
      "message": "tunnels: add _rcu annotations\n\n(struct ip6_tnl)-\u003enext is rcu protected :\n(struct ip_tunnel)-\u003enext is rcu protected :\n(struct xfrm6_tunnel)-\u003enext is rcu protected :\n\nadd __rcu annotation and proper rcu primitives.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3cc77ec74e1583b50b8405114cdbd6b8ebb8c474",
      "tree": "3f45e2ddfc224edd166b1cdc79ddff62532b4c7d",
      "parents": [
        "198caeca3eb4c81bbdbeb34a870868002f89b3d2"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Sun Oct 24 21:32:36 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 25 13:09:44 2010 -0700"
      },
      "message": "net/802: add __rcu annotations\n\n(struct net_device)-\u003egarp_port is rcu protected :\n(struct garp_port)-\u003eapplicants is rcu protected :\n\nadd __rcu annotation and proper rcu primitives.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "198caeca3eb4c81bbdbeb34a870868002f89b3d2",
      "tree": "ac2c01e12b71c3a88a8b2d6b86151b618878af1a",
      "parents": [
        "b616b09afabf6d569aa31176aa86f05d2586de3e"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Sun Oct 24 21:32:05 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 25 13:09:43 2010 -0700"
      },
      "message": "ipv6: ip6_ptr rcu annotations\n\n(struct net_device)-\u003eip6_ptr is rcu protected :\n\nadd __rcu annotation and proper rcu primitives.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b616b09afabf6d569aa31176aa86f05d2586de3e",
      "tree": "9765278f9825a612c27fea34aba0c614594b88c5",
      "parents": [
        "5202e173d7bc5ff832a4f36e66f26e00feb343c6"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Sun Oct 24 21:31:58 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 25 13:09:43 2010 -0700"
      },
      "message": "vlan: rcu annotations\n\n(struct net_device)-\u003evlgrp is rcu protected :\n\nadd __rcu annotation and proper rcu primitives.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "11a766ce915fc9f8663714eac6d59239388534ea",
      "tree": "a796626038d96d9e1fdf53d94a7aecd5acc14803",
      "parents": [
        "0926f91083f34d047abc74f1ca4fa6a9c161f7db"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 25 12:51:55 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 25 12:51:55 2010 -0700"
      },
      "message": "net: Increase xmit RECURSION_LIMIT to 10.\n\nThree is definitely too low, and we know from reports that GRE tunnels\nstacked as deeply as 37 levels cause stack overflows, so pick some\nreasonable value between those two.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c8716d9dc13c7f6ee92f2bfc6cc3b723b417bff8",
      "tree": "3714709813e4e529de7210cb679d1e34b20a59d9",
      "parents": [
        "30115c2252fcf9d21aae029ff0e27f4cc962ef44"
      ],
      "author": {
        "name": "Rajkumar Manoharan",
        "email": "rmanoharan@atheros.com",
        "time": "Sat Oct 23 10:59:57 2010 +0530"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Oct 25 14:45:56 2010 -0400"
      },
      "message": "mac80211: Fix ibss station got expired immediately\n\nStation addition in ieee80211_ibss_rx_queued_mgmt is not updating\nsta-\u003elast_rx which is causing station expiry in ieee80211_ibss_work\npath. So sta addition and deletion happens repeatedly.\n\nCC: stable@kernel.org\nSigned-off-by: Rajkumar Manoharan \u003crmanoharan@atheros.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "a171fba491f54216e356efa46096171a7ed01d10",
      "tree": "e0d89a5324c677e4049ce18011f3b7f948b071a0",
      "parents": [
        "3d2f2cd066e9e2b7e43d516d92e66dac2fc46aa0"
      ],
      "author": {
        "name": "Luis R. Rodriguez",
        "email": "lrodriguez@atheros.com",
        "time": "Mon Oct 18 17:44:51 2010 -0700"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Oct 25 14:43:14 2010 -0400"
      },
      "message": "cfg80211: fix regression on processing country IEs\n\nThe patch 4f366c5:\n\n\twireless: only use alpha2 regulatory information from country IE\n\nremoved some complex intersection we were always doing between the AP\u0027s\ncountry IE info and what we got from CRDA. When CRDA sent us back a\nregulatory domain we would do some sanity checks on that regulatory\ndomain response we just got. Part of these sanity checks included\nchecking that we already had performed an intersection for the\nrequest of NL80211_REGDOM_SET_BY_COUNTRY_IE type.\n\nThis mean that cfg80211 was only processing country IEs for cases\nwhere we already had an intersection, but since we removed enforcing\nthis this is no longer required, we should just apply the country\nIE country hint with the data received from CRDA.\n\nThis patch has fixes intended for kernels \u003e\u003d 2.6.36.\n\nCc: stable@kernel.org\nReported-by: Easwar Krishnan \u003ceaswar.krishnan@atheros.com\u003e\nSigned-off-by: Luis R. Rodriguez \u003clrodriguez@atheros.com\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "5f4e6b2d3c74c1adda1cbfd9d9d30da22c7484fc",
      "tree": "b6790e3f195491139d2af7642ef3f4f51408ca10",
      "parents": [
        "cae7f953e8afa9b1ce234fd0907183b643cc5ab8"
      ],
      "author": {
        "name": "Christian Lamparter",
        "email": "chunkeey@googlemail.com",
        "time": "Sat Oct 16 18:49:15 2010 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Oct 25 14:43:13 2010 -0400"
      },
      "message": "mac80211: don\u0027t sanitize invalid rates\n\nI found this bug while poking around with a pure-gn AP.\n\nCommit:\ncfg80211/mac80211: Use more generic bitrate mask for rate control\n\nAdded some sanity checks to ensure that each tx rate index\nis included in the configured mask and it would change any\nrate indexes if it wasn\u0027t.\n\nBut, the current implementation doesn\u0027t take into account\nthat the invalid rate index \"-1\" has a special meaning\n(\u003d no further attempts) and it should not be \"changed\".\n\nSigned-off-by: Christian Lamparter \u003cchunkeey@googlemail.com\u003e\nCc: stable@kernel.org\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "99b88a0ecbdbc6df03527292571b2b442965814a",
      "tree": "71a5c8b9e0dcb6e6a07c182e05b97bff8095a348",
      "parents": [
        "229aebb873e29726b91e076161649cf45154b0bf"
      ],
      "author": {
        "name": "Tejun Heo",
        "email": "tj@kernel.org",
        "time": "Fri Oct 15 17:35:28 2010 +0200"
      },
      "committer": {
        "name": "John W. Linville",
        "email": "linville@tuxdriver.com",
        "time": "Mon Oct 25 14:43:12 2010 -0400"
      },
      "message": "mac80211: cancel restart_work explicitly instead of depending on flush_scheduled_work()\n\niee80211_hw-\u003erestart_work is the only work which uses the system\nworkqueue.  Instead of calling flush_scheduled_work() during\niee80211_exit(), cancel the work during unregistration.\n\nThis is to prepare for the deprecation and removal of\nflush_scheduled_work().\n\nSigned-off-by: Tejun Heo \u003ctj@kernel.org\u003e\nSigned-off-by: John W. Linville \u003clinville@tuxdriver.com\u003e\n"
    },
    {
      "commit": "f6649a7e5a9ee99e9623878f4a5579cc2f6cdd51",
      "tree": "183438313c7593565980a1445f208e0ba30162cd",
      "parents": [
        "1e54622e0403891b10f2105663e0f9dd595a1f17"
      ],
      "author": {
        "name": "Martin Schwidefsky",
        "email": "schwidefsky@de.ibm.com",
        "time": "Mon Oct 25 16:10:38 2010 +0200"
      },
      "committer": {
        "name": "Martin Schwidefsky",
        "email": "sky@mschwide.boeblingen.de.ibm.com",
        "time": "Mon Oct 25 16:10:19 2010 +0200"
      },
      "message": "[S390] cleanup lowcore access from external interrupts\n\nRead external interrupts parameters from the lowcore in the first\nlevel interrupt handler in entry[64].S.\n\nSigned-off-by: Martin Schwidefsky \u003cschwidefsky@de.ibm.com\u003e\n"
    },
    {
      "commit": "e341b2ddc1e8e5ff998ac5462dc5138775d1d492",
      "tree": "d4fc3fe014017d10f0b5e5c55c4e884f09e5decf",
      "parents": [
        "fd59cba4f0d80a6dc4cc7372f03af905b1758e03"
      ],
      "author": {
        "name": "Stephen Rothwell",
        "email": "sfr@canb.auug.org.au",
        "time": "Sun Oct 24 22:26:41 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Oct 24 22:26:41 2010 -0700"
      },
      "message": "l2tp: static functions should not be exported\n\nCauses these build failures on PowerPC:\n\nnet/l2tp/l2tp_core.c:1228: error: __ksymtab_l2tp_tunnel_closeall causes a section type conflict\nnet/l2tp/l2tp_core.c:1228: error: __ksymtab_l2tp_tunnel_closeall causes a section type conflict\nnet/l2tp/l2tp_core.c:1006: error: __ksymtab_l2tp_xmit_core causes a section type conflict\nnet/l2tp/l2tp_core.c:1006: error: __ksymtab_l2tp_xmit_core causes a section type conflict\nnet/l2tp/l2tp_core.c:847: error: __ksymtab_l2tp_udp_recv_core causes a section type conflict\nnet/l2tp/l2tp_core.c:847: error: __ksymtab_l2tp_udp_recv_core causes a section type conflict\n\nSigned-off-by: Stephen Rothwell \u003csfr@canb.auug.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5c398dc8f5a58b5417d8ae0d474704feb6e12a12",
      "tree": "f4305312340df1ebeae5de3896d3fb4c3da3c6e8",
      "parents": [
        "7f8a688e1e319fcc94dbed83a6ec82cea13f10b9"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Sun Oct 24 04:27:10 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Oct 24 16:25:39 2010 -0700"
      },
      "message": "netlink: fix netlink_change_ngroups()\n\ncommit 6c04bb18ddd633 (netlink: use call_rcu for netlink_change_ngroups)\nused a somewhat convoluted and racy way to perform call_rcu().\n\nThe old block of memory is freed after a grace period, but the rcu_head\nused to track it is located in new block.\n\nThis can clash if we call two times or more netlink_change_ngroups(),\nand a block is freed before another. call_rcu() called on different cpus\nmakes no guarantee in order of callbacks.\n\nFix this using a more standard way of handling this : Each block of\nmemory contains its own rcu_head, so that no \u0027use after free\u0027 can\nhappens.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nCC: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nCC: Paul E. McKenney \u003cpaulmck@linux.vnet.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    }
  ],
  "next": "b889416b54c90f59276537debd92cb4e84b5f550"
}
