fi
done
-diff --git a/drivers/net/ethernet/realtek/r8169.c b/drivers/net/ethernet/realtek/r8169.c
-index 7a0c800..ec5ebbb 100644
---- a/drivers/net/ethernet/realtek/r8169.c
-+++ b/drivers/net/ethernet/realtek/r8169.c
-@@ -6927,6 +6927,14 @@ rtl_init_one(struct pci_dev *pdev, const
- for (i = 0; i < ETH_ALEN; i++)
- dev->dev_addr[i] = RTL_R8(MAC0 + i);
-
-+ if (!is_valid_ether_addr(dev->dev_addr)) {
-+ /* Report it and use a random ethernet address instead */
-+ netdev_err(dev, "Invalid MAC address: %pM\n", dev->dev_addr);
-+ random_ether_addr(dev->dev_addr);
-+ netdev_info(dev, "Using random MAC address: %pM\n",
-+ dev->dev_addr);
-+ }
-+
- SET_ETHTOOL_OPS(dev, &rtl8169_ethtool_ops);
- dev->watchdog_timeo = RTL8169_TX_TIMEOUT;
-
-commit 8efb88340e29293e05f6b498b60596884c05a8a8
-Author: J. Bruce Fields <bfields@redhat.com>
-Date: Mon Jul 8 13:44:45 2013 -0400
-
- svcrpc: fix failures to handle -1 uid's
-
- As of f025adf191924e3a75ce80e130afcd2485b53bb8 "sunrpc: Properly decode
- kuids and kgids in RPC_AUTH_UNIX credentials" any rpc containing a -1
- (0xffff) uid or gid would fail with a badcred error.
-
- Commit afe3c3fd5392b2f0066930abc5dbd3f4b14a0f13 "svcrpc: fix failures to
- handle -1 uid's and gid's" fixed part of the problem, but overlooked the
- gid upcall--the kernel can request supplementary gid's for the -1 uid,
- but mountd's attempt write a response will get -EINVAL.
-
- Symptoms were nfsd failing to reply to the first attempt to use a newly
- negotiated krb5 context.
-
- Reported-by: Sven Geggus <lists@fuchsschwanzdomain.de>
- Tested-by: Sven Geggus <lists@fuchsschwanzdomain.de>
- Signed-off-by: J. Bruce Fields <bfields@redhat.com>
-
-diff --git a/net/sunrpc/svcauth_unix.c b/net/sunrpc/svcauth_unix.c
-index a98853d..621ca7b 100644
---- a/net/sunrpc/svcauth_unix.c
-+++ b/net/sunrpc/svcauth_unix.c
-@@ -493,8 +493,6 @@ static int unix_gid_parse(struct cache_detail *cd,
- if (rv)
- return -EINVAL;
- uid = make_kuid(&init_user_ns, id);
-- if (!uid_valid(uid))
-- return -EINVAL;
- ug.uid = uid;
-
- expiry = get_expiry(&mesg);