)]}'
{
  "log": [
    {
      "commit": "13c1d18931ebb5cf407cb348ef2cd6284d68902d",
      "tree": "6d590f85e48b4cce8f67e42c65b88fce8fcc49c6",
      "parents": [
        "95430c0b140c31cb9e39f876afe1c0e9947d1aaf"
      ],
      "author": {
        "name": "Arnaud Ebalard",
        "email": "arno@natisbad.org",
        "time": "Sun Oct 05 13:33:42 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Oct 05 13:33:42 2008 -0700"
      },
      "message": "xfrm: MIGRATE enhancements (draft-ebalard-mext-pfkey-enhanced-migrate)\n\nProvides implementation of the enhancements of XFRM/PF_KEY MIGRATE mechanism\nspecified in draft-ebalard-mext-pfkey-enhanced-migrate-00. Defines associated\nPF_KEY SADB_X_EXT_KMADDRESS extension and XFRM/netlink XFRMA_KMADDRESS\nattribute.\n\nSigned-off-by: Arnaud Ebalard \u003carno@natisbad.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "12a169e7d8f4b1c95252d8b04ed0f1033ed7cfe2",
      "tree": "9630d7798d4fdfc06d6001ccd057aff68f39f908",
      "parents": [
        "b262e60309e1b0eb25d300c7e739427d5316abb1"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Oct 01 07:03:24 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 01 07:03:24 2008 -0700"
      },
      "message": "ipsec: Put dumpers on the dump list\n\nHerbert Xu came up with the idea and the original patch to make\nxfrm_state dump list contain also dumpers:\n\nAs it is we go to extraordinary lengths to ensure that states\ndon\u0027t go away while dumpers go to sleep.  It\u0027s much easier if\nwe just put the dumpers themselves on the list since they can\u0027t\ngo away while they\u0027re going.\n\nI\u0027ve also changed the order of addition on new states to prevent\na never-ending dump.\n\nTimo Teräs improved the patch to apply cleanly to latest tree,\nmodified iteration code to be more readable by using a common\nstruct for entries in the list, implemented the same idea for\nxfrm_policy dumping and moved the af_key specific \"last\" entry\ncaching to af_key.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: Timo Teras \u003ctimo.teras@iki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b262e60309e1b0eb25d300c7e739427d5316abb1",
      "tree": "bf319d78c79bb5cb617ff0c8340c73aa349bba15",
      "parents": [
        "93c8b90f01f0dc73891da4e84b26524b61d29d66",
        "0523820482dcb42784572ffd2296c2f08c275a2b"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 01 06:12:56 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 01 06:12:56 2008 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6\n\nConflicts:\n\n\tdrivers/net/wireless/ath9k/core.c\n\tdrivers/net/wireless/ath9k/main.c\n\tnet/core/dev.c\n"
    },
    {
      "commit": "d01dbeb6af7a0848063033f73c3d146fec7451f3",
      "tree": "7b912030e10097483843c0dfa006e3793e31c9ae",
      "parents": [
        "94aca1dac6f6d21f4b07e4864baf7768cabcc6e7"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Sep 30 02:03:19 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 30 02:03:19 2008 -0700"
      },
      "message": "ipsec: Fix pskb_expand_head corruption in xfrm_state_check_space\n\nWe\u0027re never supposed to shrink the headroom or tailroom.  In fact,\nshrinking the headroom is a fatal action.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5c1824587f0797373c95719a196f6098f7c6d20c",
      "tree": "c3a5af01afc01d88e111c7e1821b03bf404566f6",
      "parents": [
        "fcaa40669cd798ca2ac0d15441e8a1d1145f2b16"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Sep 22 19:48:19 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Sep 22 19:48:19 2008 -0700"
      },
      "message": "ipsec: Fix xfrm_state_walk race\n\nAs discovered by Timo Teräs, the currently xfrm_state_walk scheme\nis racy because if a second dump finishes before the first, we\nmay free xfrm states that the first dump would walk over later.\n\nThis patch fixes this by storing the dumps in a list in order\nto calculate the correct completion counter which cures this\nproblem.\n\nI\u0027ve expanded netlink_cb in order to accomodate the extra state\nrelated to this.  It shouldn\u0027t be a big deal since netlink_cb\nis kmalloced for each dump and we\u0027re just increasing it by 4 or\n8 bytes.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "08569908fffec3625e29eec7cf7577eaa512e719",
      "tree": "5d28f7766863b7146e76a92909e8a1c5099ef886",
      "parents": [
        "abb81c4f3cb9b8d421f1e5474811ef1d461d341c"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 09 22:13:28 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 09 22:13:28 2008 -0700"
      },
      "message": "ipsec: Add missing list_del() in xfrm_state_gc_task().\n\nOtherwise entries stay on the GC todo list forever, even after we free\nthem.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "abb81c4f3cb9b8d421f1e5474811ef1d461d341c",
      "tree": "71a08df3a53eb9e19a62c673d77084e4d81f708b",
      "parents": [
        "dacc62dbf56e872ad96edde0393b9deb56d80cd5"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Sep 09 19:58:29 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 09 19:58:29 2008 -0700"
      },
      "message": "ipsec: Use RCU-like construct for saved state within a walk\n\nNow that we save states within a walk we need synchronisation\nso that the list the saved state is on doesn\u0027t disappear from\nunder us.\n\nAs it stands this is done by keeping the state on the list which\nis bad because it gets in the way of the management of the state\nlife-cycle.\n\nAn alternative is to make our own pseudo-RCU system where we use\ncounters to indicate which state can\u0027t be freed immediately as\nit may be referenced by an ongoing walk when that resumes.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "47abf28d5b36521558a848a346064a3a3c82bd9e",
      "tree": "736e9402b52f08210b8c4bdda9d214e98a6bf7de",
      "parents": [
        "28faa979746b2352cd78a376bf9f52db953bda46",
        "e550dfb0c2c31b6363aa463a035fc9f8dcaa3c9b"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 09 19:28:03 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 09 19:28:03 2008 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6\n"
    },
    {
      "commit": "28faa979746b2352cd78a376bf9f52db953bda46",
      "tree": "8fec5cf690331e3f99d712fca7f38f00ec17625d",
      "parents": [
        "ded67c0e2f0388458c36e8fd3b0c8be07c53db08"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 09 16:08:51 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 09 16:08:51 2008 -0700"
      },
      "message": "ipsec: Make xfrm_larval_drop default to 1.\n\nThe previous default behavior is definitely the least user\nfriendly.  Hanging there forever just because the keying\ndaemon is wedged or the refreshing of the policy can\u0027t move\nforward is anti-social to say the least.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "225f40055f779032974a9fce7b2f9c9eda04ff58",
      "tree": "dc2d8621f11ca7524ffc895c7c0a64593557fee9",
      "parents": [
        "fd9ec7d31ffc36917dc7cac0fd0435f587a572d4"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Sep 09 05:23:37 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 09 05:23:37 2008 -0700"
      },
      "message": "ipsec: Restore larval states and socket policies in dump\n\nThe commit commit 4c563f7669c10a12354b72b518c2287ffc6ebfb3 (\"[XFRM]:\nSpeed up xfrm_policy and xfrm_state walking\") inadvertently removed\nlarval states and socket policies from netlink dumps.  This patch\nrestores them.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "37b08e34a98c664bea86e3fae718ac45a46b7276",
      "tree": "8d0cc32bdbfda4d992177aeda56700bea0f918dd",
      "parents": [
        "06770843c2f0f929a6e0c758dc433902a01aabfb"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 02 20:14:15 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 02 20:14:15 2008 -0700"
      },
      "message": "ipsec: Fix deadlock in xfrm_state management.\n\nEver since commit 4c563f7669c10a12354b72b518c2287ffc6ebfb3\n(\"[XFRM]: Speed up xfrm_policy and xfrm_state walking\") it is\nillegal to call __xfrm_state_destroy (and thus xfrm_state_put())\nwith xfrm_state_lock held.  If we do, we\u0027ll deadlock since we\nhave the lock already and __xfrm_state_destroy() tries to take\nit again.\n\nFix this by pushing the xfrm_state_put() calls after the lock\nis dropped.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9d7d74029e0f5fde3b88b39892b9b9cfdf4ea10a",
      "tree": "a079c58127d8aae4977c0650e5327859e93e22e9",
      "parents": [
        "773b4e02be28220e9ead80a5fdb180031361439a"
      ],
      "author": {
        "name": "Julien Brunel",
        "email": "brunel@diku.dk",
        "time": "Tue Sep 02 17:24:28 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 02 17:24:28 2008 -0700"
      },
      "message": "net/xfrm: Use an IS_ERR test rather than a NULL test\n\nIn case of error, the function xfrm_bundle_create returns an ERR\npointer, but never returns a NULL pointer. So a NULL test that comes\nafter an IS_ERR test should be deleted.\n\nThe semantic match that finds this problem is as follows:\n(http://www.emn.fr/x-info/coccinelle/)\n\n// \u003csmpl\u003e\n@match_bad_null_test@\nexpression x, E;\nstatement S1,S2;\n@@\nx \u003d  xfrm_bundle_create(...)\n... when !\u003d x \u003d E\n*  if (x !\u003d NULL) \nS1 else S2\n// \u003c/smpl\u003e\n\nSigned-off-by: Julien Brunel \u003cbrunel@diku.dk\u003e\nSigned-off-by: Julia Lawall \u003cjulia@diku.dk\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c1e24df27fb1058739789126db6ad1b1ef719346",
      "tree": "57409e48ad8fb506975e1207af63bbd51495575f",
      "parents": [
        "36723873b664fb6b5cfe06d291df948126e43f50"
      ],
      "author": {
        "name": "Jean-Christophe DUBOIS",
        "email": "jcd@tribudubois.net",
        "time": "Wed Aug 13 13:35:37 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Aug 13 13:35:37 2008 -0700"
      },
      "message": "xfrm: remove unnecessary variable in xfrm_output_resume() 2nd try\n\nSmall fix removing an unnecessary intermediate variable.\n\nSigned-off-by: Jean-Christophe DUBOIS \u003cjcd@tribudubois.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "547b792cac0a038b9dbf958d3c120df3740b5572",
      "tree": "08554d083b0ca7d65739dc1ce12f9b12a9b8e1f8",
      "parents": [
        "53e5e96ec18da6f65e89f05674711e1c93d8df67"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Fri Jul 25 21:43:18 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 25 21:43:18 2008 -0700"
      },
      "message": "net: convert BUG_TRAP to generic WARN_ON\n\nRemoves legacy reinvent-the-wheel type thing. The generic\nmachinery integrates much better to automated debugging aids\nsuch as kerneloops.org (and others), and is unambiguous due to\nbetter naming. Non-intuively BUG_TRAP() is actually equal to\nWARN_ON() rather than BUG_ON() though some might actually be\npromoted to BUG_ON() but I left that to future.\n\nI could make at least one BUILD_BUG_ON conversion.\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7d7e5a60c62e88cb8782760bb6c4d3bd1577a6c6",
      "tree": "c6bedd62097698466d7dc0b5166e4ed29e1b6ee5",
      "parents": [
        "6fccab671f2f0a24b799f29a4ec878f62d34656c"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Jul 25 02:55:33 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 25 02:55:33 2008 -0700"
      },
      "message": "ipsec: ipcomp - Decompress into frags if necessary\n\nWhen decompressing extremely large packets allocating them through\nkmalloc is prone to failure.  Therefore it\u0027s better to use page\nfrags instead.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6fccab671f2f0a24b799f29a4ec878f62d34656c",
      "tree": "e90a1ac0770f8fe59bd7c8768663052a7756b950",
      "parents": [
        "cffe1c5d7a5a1e54f7c2c6d0510f651a965bccc3"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Jul 25 02:54:40 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jul 25 02:54:40 2008 -0700"
      },
      "message": "ipsec: ipcomp - Merge IPComp implementations\n\nThis patch merges the IPv4/IPv6 IPComp implementations since most\nof the code is identical.  As a result future enhancements will no\nlonger need to be duplicated.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "721499e8931c5732202481ae24f2dfbf9910f129",
      "tree": "c94d8d681966109bb41f712f21f3a9825ae2172d",
      "parents": [
        "407d819cf0fd54c6fc1138a509225696aecafd15"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Sat Jul 19 22:34:43 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jul 19 22:34:43 2008 -0700"
      },
      "message": "netns: Use net_eq() to compare net-namespaces for optimization.\n\nWithout CONFIG_NET_NS, namespace is always \u0026init_net.\nCompiler will be able to omit namespace comparisons with this patch.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ccf9b3b83d0e56fbf20c00a08b15031ce13204a7",
      "tree": "ecefe07436ac172dc99deb6e77e7a7cfd5c81155",
      "parents": [
        "0ce28553cc018be5022f51e67c87997f7271534e"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Thu Jul 10 16:55:37 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jul 10 16:55:37 2008 -0700"
      },
      "message": "xfrm: Add a XFRM_STATE_AF_UNSPEC flag to xfrm_usersa_info\n\nAdd a XFRM_STATE_AF_UNSPEC flag to handle the AF_UNSPEC behavior for\nthe selector family. Userspace applications can set this flag to leave\nthe selector family of the xfrm_state unspecified.  This can be used\nto to handle inter family tunnels if the selector is not set from\nuserspace.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a13366c632132bb9f8f2950a79773d8f68f4871e",
      "tree": "b9d9414236087dd7d0ea818141e9b41feecff6cc",
      "parents": [
        "8b91ac09732895f928ed6107bda5318cf260520b"
      ],
      "author": {
        "name": "Adrian-Ken Rueegsegger",
        "email": "rueegsegger@swiss-it.ch",
        "time": "Wed Jun 04 12:04:55 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 04 12:04:55 2008 -0700"
      },
      "message": "xfrm: xfrm_algo: correct usage of RIPEMD-160\n\nThis patch fixes the usage of RIPEMD-160 in xfrm_algo which in turn\nallows hmac(rmd160) to be used as authentication mechanism in IPsec\nESP and AH (see RFC 2857).\n\nSigned-off-by: Adrian-Ken Rueegsegger \u003crueegsegger@swiss-it.ch\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "88860c9ef45963eb69411b0d2ace4e8ba0f7a32f",
      "tree": "043447814c6913d16a5a191dced1989d81cc4fb3",
      "parents": [
        "51f82a2b128131c411880aed2cb802b166fe3445"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed May 21 17:36:21 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed May 21 17:36:21 2008 -0700"
      },
      "message": "xfrm_user: Remove zero length key checks.\n\nThe crypto layer will determine whether that is valid\nor not.\n\nSuggested by Herbert Xu, based upon a report and patch\nby Martin Willi.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "f5184d267c1aedb9b7a8cc44e08ff6b8d382c3b5",
      "tree": "5ccce7558f9e1e53e5b189d6e2fe62a667988ac8",
      "parents": [
        "8388e3da34edb141362bb42811ee487dfec15525"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Mon May 12 20:48:31 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon May 12 20:48:31 2008 -0700"
      },
      "message": "net: Allow netdevices to specify needed head/tailroom\n\nThis patch adds needed_headroom/needed_tailroom members to struct\nnet_device and updates many places that allocate sbks to use them. Not\nall of them can be converted though, and I\u0027m sure I missed some (I\nmostly grepped for LL_RESERVED_SPACE)\n\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9781db7b345b5dfe93787aaaf310c861db7c1ede",
      "tree": "d9796e29fd914ca04835636be95bbd5082a034fd",
      "parents": [
        "97094dcf5cefc8ccfdf93839f54dac2c4d316165",
        "8b67dca9420474623709e00d72a066068a502b20"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 29 11:41:22 2008 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 29 11:41:22 2008 -0700"
      },
      "message": "Merge branch \u0027audit.b50\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/viro/audit-current\n\n* \u0027audit.b50\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/viro/audit-current:\n  [PATCH] new predicate - AUDIT_FILETYPE\n  [patch 2/2] Use find_task_by_vpid in audit code\n  [patch 1/2] audit: let userspace fully control TTY input auditing\n  [PATCH 2/2] audit: fix sparse shadowed variable warnings\n  [PATCH 1/2] audit: move extern declarations to audit.h\n  Audit: MAINTAINERS update\n  Audit: increase the maximum length of the key field\n  Audit: standardize string audit interfaces\n  Audit: stop deadlock from signals under load\n  Audit: save audit_backlog_limit audit messages in case auditd comes back\n  Audit: collect sessionid in netlink messages\n  Audit: end printk with newline\n"
    },
    {
      "commit": "801678c5a3b4c79236970bcca27c733f5559e0d1",
      "tree": "5ad4761f539525077895f261b64fccda4d1303c4",
      "parents": [
        "9a6f70bbed4e8b72dd340812d7c606bfd5e00b47"
      ],
      "author": {
        "name": "Hirofumi Nakagawa",
        "email": "hnakagawa@miraclelinux.com",
        "time": "Tue Apr 29 01:03:09 2008 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 29 08:06:25 2008 -0700"
      },
      "message": "Remove duplicated unlikely() in IS_ERR()\n\nSome drivers have duplicated unlikely() macros.  IS_ERR() already has\nunlikely() in itself.\n\nThis patch cleans up such pointless code.\n\nSigned-off-by: Hirofumi Nakagawa \u003chnakagawa@miraclelinux.com\u003e\nAcked-by: David S. Miller \u003cdavem@davemloft.net\u003e\nAcked-by: Jeff Garzik \u003cjeff@garzik.org\u003e\nCc: Paul Clements \u003cpaul.clements@steeleye.com\u003e\nCc: Richard Purdie \u003crpurdie@rpsys.net\u003e\nCc: Alessandro Zummo \u003ca.zummo@towertech.it\u003e\nCc: David Brownell \u003cdavid-b@pacbell.net\u003e\nCc: James Bottomley \u003cJames.Bottomley@HansenPartnership.com\u003e\nCc: Michael Halcrow \u003cmhalcrow@us.ibm.com\u003e\nCc: Anton Altaparmakov \u003caia21@cantab.net\u003e\nCc: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\nCc: Carsten Otte \u003ccotte@de.ibm.com\u003e\nCc: Patrick McHardy \u003ckaber@trash.net\u003e\nCc: Paul Mundt \u003clethal@linux-sh.org\u003e\nCc: Jaroslav Kysela \u003cperex@perex.cz\u003e\nCc: Takashi Iwai \u003ctiwai@suse.de\u003e\nAcked-by: Mike Frysinger \u003cvapier@gentoo.org\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "2532386f480eefbdd67b48be55fb4fb3e5a6081c",
      "tree": "dd6a5a3c4116a67380a1336319c16632f04f80f9",
      "parents": [
        "436c405c7d19455a71f42c9bec5fd5e028f1eb4e"
      ],
      "author": {
        "name": "Eric Paris",
        "email": "eparis@redhat.com",
        "time": "Fri Apr 18 10:09:25 2008 -0400"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Mon Apr 28 06:18:03 2008 -0400"
      },
      "message": "Audit: collect sessionid in netlink messages\n\nPreviously I added sessionid output to all audit messages where it was\navailable but we still didn\u0027t know the sessionid of the sender of\nnetlink messages.  This patch adds that information to netlink messages\nso we can audit who sent netlink messages.\n\nSigned-off-by: Eric Paris \u003ceparis@redhat.com\u003e\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "01a2202c95989a4df48e9a5b5e013cb80c6b2d66",
      "tree": "8eb1bd6cc4f99fc9fc3def2cc81ab256fe40e206",
      "parents": [
        "0b80ae4201e5128e16e5161825f5cd377a5d1fee"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Apr 27 00:59:59 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Apr 27 14:26:52 2008 -0700"
      },
      "message": "[IPSEC]: Use digest_null directly for auth\n\nPreviously digest_null had no setkey function which meant that\nwe used hmac(digest_null) for IPsec since IPsec always calls\nsetkey.  Now that digest_null has a setkey we no longer need to\ndo that.\n\nIn fact when only confidentiality is specified for ESP we already\nuse digest_null directly.  However, when the null algorithm is\nexplicitly specified by the user we still opt for hmac(digest_null).\n\nThis patch removes this discrepancy.  I have not added a new compat\nname for it because by chance it wasn\u0027t actualy possible for the user\nto specify the name hmac(digest_null) due to a key length check in\nxfrm_user (which I found out when testing that compat name :)\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5e2c433d9f84dd9b0e01ef8607380d53a7f64d69",
      "tree": "c43f9f0a327ecb6c9393e03b383b8895fb8530bd",
      "parents": [
        "653252c2302cdf2dfbca66a7e177f7db783f9efa"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Sat Apr 26 22:24:10 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Apr 27 14:26:48 2008 -0700"
      },
      "message": "[XFRM] AUDIT: Fix flowlabel text format ambibuity.\n\nFlowlabel text format was not correct and thus ambiguous.\nFor example, 0x00123 or 0x01203 are formatted as 0x123.\nThis is not what audit tools want.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c5d18e984a313adf5a1a4ae69e0b1d93cf410229",
      "tree": "2922514a388759b999757eec49b7a5bd9f290e3c",
      "parents": [
        "7c3f944e29c02d71e13442e977cf4cec19c39e98"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Apr 22 00:46:42 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 22 00:46:42 2008 -0700"
      },
      "message": "[IPSEC]: Fix catch-22 with algorithm IDs above 31\n\nAs it stands it\u0027s impossible to use any authentication algorithms\nwith an ID above 31 portably.  It just happens to work on x86 but\nfails miserably on ppc64.\n\nThe reason is that we\u0027re using a bit mask to check the algorithm\nID but the mask is only 32 bits wide.\n\nAfter looking at how this is used in the field, I have concluded\nthat in the long term we should phase out state matching by IDs\nbecause this is made superfluous by the reqid feature.  For current\napplications, the best solution IMHO is to allow all algorithms when\nthe bit masks are all ~0.\n\nThe following patch does exactly that.\n\nThis bug was identified by IBM when testing on the ppc64 platform\nusing the NULL authentication algorithm which has an ID of 251.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2c8dd11636e3a5f14a7fb765331b7043f01fe937",
      "tree": "ad264804033c49c507865ecff7f9c61f506debce",
      "parents": [
        "569508c964a8b5235e00998523bc3acd3f6aff01"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Mon Apr 14 14:47:48 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 14 14:47:48 2008 -0700"
      },
      "message": "[XFRM]: Compilation warnings in xfrm_user.c.\n\nWhen CONFIG_SECURITY_NETWORK_XFRM is undefined the following warnings appears:\nnet/xfrm/xfrm_user.c: In function \u0027xfrm_add_pol_expire\u0027:\nnet/xfrm/xfrm_user.c:1576: warning: \u0027ctx\u0027 may be used uninitialized in this function\nnet/xfrm/xfrm_user.c: In function \u0027xfrm_get_policy\u0027:\nnet/xfrm/xfrm_user.c:1340: warning: \u0027ctx\u0027 may be used uninitialized in this function\n(security_xfrm_policy_alloc is noop for the case).\n\nIt seems that they are result of the commit\n03e1ad7b5d871d4189b1da3125c2f12d1b5f7d0b (\"LSM: Make the Labeled IPsec\nhooks more stack friendly\")\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "df39e8ba56a788733d369068c7319e04b1da3cd5",
      "tree": "1e9be853bdb455e341cdbf957656f342cfa2eb9e",
      "parents": [
        "f5572855ec492334d8c3ec0e0e86c31865d5cf07",
        "159d83363b629c91d020734207c1bc788b96af5a"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 14 02:30:23 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 14 02:30:23 2008 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6\n\nConflicts:\n\n\tdrivers/net/ehea/ehea_main.c\n\tdrivers/net/wireless/iwlwifi/Kconfig\n\tdrivers/net/wireless/rt2x00/rt61pci.c\n\tnet/ipv4/inet_timewait_sock.c\n\tnet/ipv6/raw.c\n\tnet/mac80211/ieee80211_sta.c\n"
    },
    {
      "commit": "03e1ad7b5d871d4189b1da3125c2f12d1b5f7d0b",
      "tree": "1e7f291ac6bd0c1f3a95e8252c32fcce7ff47ea7",
      "parents": [
        "00447872a643787411c2c0cb1df6169dda8b0c47"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Sat Apr 12 19:07:52 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Apr 12 19:07:52 2008 -0700"
      },
      "message": "LSM: Make the Labeled IPsec hooks more stack friendly\n\nThe xfrm_get_policy() and xfrm_add_pol_expire() put some rather large structs\non the stack to work around the LSM API.  This patch attempts to fix that\nproblem by changing the LSM API to require only the relevant \"security\"\npointers instead of the entire SPD entry; we do this for all of the\nsecurity_xfrm_policy*() functions to keep things consistent.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "bcf0dda8d2408fe1c1040cdec5a98e5fcad2ac72",
      "tree": "33117ad780d212f8a83c007ccc1b95bc0debbdbf",
      "parents": [
        "21f644f3eabde637f255f75ad05d0821a7a36b7f"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Apr 09 15:08:24 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 09 15:08:24 2008 -0700"
      },
      "message": "[XFRM]: xfrm_user: fix selector family initialization\n\nCommit df9dcb45 ([IPSEC]: Fix inter address family IPsec tunnel handling)\nbroke openswan by removing the selector initialization for tunnel mode\nin case it is uninitialized.\n\nThis patch restores the initialization, fixing openswan, but probably\nbreaking inter-family tunnels again (unknown since the patch author\ndisappeared). The correct thing for inter-family tunnels is probably\nto simply initialize the selector family explicitly.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8e8e43843ba3ced0c657cbc0fdb10644ec60f772",
      "tree": "e64954326ced9c365c52c256f01b5f9fb1bcae66",
      "parents": [
        "ed85f2c3b2b72bd20f617ac749f5c22be8d0f66e",
        "50fd4407b8bfbde7c1a0bfe4f24de7df37164342"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 27 18:48:56 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 27 18:48:56 2008 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\nConflicts:\n\n\tdrivers/net/usb/rndis_host.c\n\tdrivers/net/wireless/b43/dma.c\n\tnet/ipv6/ndisc.c\n"
    },
    {
      "commit": "c346dca10840a874240c78efe3f39acf4312a1f2",
      "tree": "c04cff20124eba5cc337cc5ec260ad2513eeb065",
      "parents": [
        "7cbca67c073263c179f605bdbbdc565ab29d801d"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Tue Mar 25 21:47:49 2008 +0900"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Wed Mar 26 04:39:53 2008 +0900"
      },
      "message": "[NET] NETNS: Omit net_device-\u003end_net without CONFIG_NET_NS.\n\nIntroduce per-net_device inlines: dev_net(), dev_net_set().\nWithout CONFIG_NET_NS, no namespace other than \u0026init_net exists.\nLet\u0027s explicitly define them to help compiler optimizations.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "9bb182a7007515239091b237fe7169b1328a61d3",
      "tree": "7be7f556c58c650a547a0db34058f8ffffbf98aa",
      "parents": [
        "df8ea19b5d2e7512095bb1e0737513b8da196d64"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Fri Feb 22 14:48:22 2008 +0900"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Tue Mar 25 10:23:57 2008 +0900"
      },
      "message": "[XFRM] MIP6: Fix address keys for routing search.\n\nEach MIPv6 XFRM state (DSTOPT/RH2) holds either destination or source\naddress to be mangled in the IPv6 header (that is \"CoA\").\nOn Inter-MN communication after both nodes binds each other,\nthey use route optimized traffic two MIPv6 states applied, and\nboth source and destination address in the IPv6 header\nare replaced by the states respectively.\nThe packet format is correct, however, next-hop routing search\nare not.\nThis patch fixes it by remembering address pairs for later states.\n\nBased on patch from Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "df9dcb4588aca9cc243cf1f3f454361a84e1cbdb",
      "tree": "53dabed7cffee752109808cbea2f812e0a6d7faf",
      "parents": [
        "fa86d322d89995fef1bfb5cc768b89d8c22ea0d9"
      ],
      "author": {
        "name": "Kazunori MIYAZAWA",
        "email": "kazunori@miyazawa.org",
        "time": "Mon Mar 24 14:51:51 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 24 14:51:51 2008 -0700"
      },
      "message": "[IPSEC]: Fix inter address family IPsec tunnel handling.\n\nSigned-off-by: Kazunori MIYAZAWA \u003ckazunori@miyazawa.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4c563f7669c10a12354b72b518c2287ffc6ebfb3",
      "tree": "056ec93f192f31640f32983c9e11bc7ce1c0692f",
      "parents": [
        "1e04d530705280770e003ac8db516722cca54758"
      ],
      "author": {
        "name": "Timo Teras",
        "email": "timo.teras@iki.fi",
        "time": "Thu Feb 28 21:31:08 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 28 21:31:08 2008 -0800"
      },
      "message": "[XFRM]: Speed up xfrm_policy and xfrm_state walking\n\nChange xfrm_policy and xfrm_state walking algorithm from O(n^2) to O(n).\nThis is achieved adding the entries to one more list which is used\nsolely for walking the entries.\n\nThis also fixes some races where the dump can have duplicate or missing\nentries when the SPD/SADB is modified during an ongoing dump.\n\nDumping SADB with 20000 entries using \"time ip xfrm state\" the sys\ntime dropped from 1.012s to 0.080s.\n\nSigned-off-by: Timo Teras \u003ctimo.teras@iki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b791160b5af4ea95c72fb59d13079664beca1963",
      "tree": "7c5b3e4d4875c002c8315c05ced0e16392eb2a30",
      "parents": [
        "82453021b8be85171350c695d7ebafe7b517c812"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Sun Feb 17 23:29:30 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 17 23:29:30 2008 -0800"
      },
      "message": "[XFRM]: Fix ordering issue in xfrm_dst_hash_transfer().\n\nKeep ordering of policy entries with same selector in\nxfrm_dst_hash_transfer().\n\nIssue should not appear in usual cases because multiple policy entries\nwith same selector are basically not allowed so far.  Bug was pointed\nout by Sebastien Decugis \u003csdecugis@hongo.wide.ad.jp\u003e.\n\nWe could convert bydst from hlist to list and use list_add_tail()\ninstead.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nAcked-by: Sebastien Decugis \u003csdecugis@hongo.wide.ad.jp\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "073a371987f9a9806a85329eed51dca1fc52a7a0",
      "tree": "924aafe5a1be81eb44b7a4756c58edebce5f9da5",
      "parents": [
        "a4d6b8af1e92daa872f55d06415b76c35f44d8bd"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Feb 14 14:52:38 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 14 14:52:38 2008 -0800"
      },
      "message": "[XFRM]: Avoid bogus BUG() when throwing new policy away.\n\nFrom: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n\nWhen we destory a new policy entry, we need to tell\nxfrm_policy_destroy() explicitly that the entry is not\nalive yet.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0f4bda005fd685f7cbb2ad47b7bab1b155df2b86",
      "tree": "65184615080e70e7fe4062451a11cabf42d44e26",
      "parents": [
        "f51f5ec6909fad9ddfcaa962377f7892d7918302"
      ],
      "author": {
        "name": "Paul Mundt",
        "email": "lethal@linux-sh.org",
        "time": "Thu Feb 14 14:48:45 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 14 14:48:45 2008 -0800"
      },
      "message": "net: xfrm statistics depend on INET\n\nnet/built-in.o: In function `xfrm_policy_init\u0027:\n/home/pmundt/devel/git/sh-2.6.25/net/xfrm/xfrm_policy.c:2338: undefined reference to `snmp_mib_init\u0027\n\nsnmp_mib_init() is only built in if CONFIG_INET is set.\n\nSigned-off-by: Paul Mundt \u003clethal@linux-sh.org\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b318e0e4ef4e85812c25afa19f75addccc834cd4",
      "tree": "95d51df1aa01978a99e763cd92fd6f7f4647bf20",
      "parents": [
        "45b503548210fe6f23e92b856421c2a3f05fd034"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Feb 12 22:50:35 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 12 22:50:35 2008 -0800"
      },
      "message": "[IPSEC]: Fix bogus usage of u64 on input sequence number\n\nAl Viro spotted a bogus use of u64 on the input sequence number which\nis big-endian.  This patch fixes it by giving the input sequence number\nits own member in the xfrm_skb_cb structure.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "405137d16fbe4c80b9e06e61af05856027745d23",
      "tree": "67c9540d5b7d968782b0d05d6a8cdee5f70afae9",
      "parents": [
        "054b0e2b2d5ed460784e8dfbf30ff4768dbf4376"
      ],
      "author": {
        "name": "Joy Latten",
        "email": "latten@austin.ibm.com",
        "time": "Thu Feb 07 23:11:56 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 07 23:11:56 2008 -0800"
      },
      "message": "[IPSEC]: Add support for aes-ctr.\n\nThe below patch allows IPsec to use CTR mode with AES encryption\nalgorithm. Tested this using setkey in ipsec-tools.\n\nSigned-off-by: Joy Latten \u003clatten@austin.ibm.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0c11b9428f619ab377c92eff2f160a834a6585dd",
      "tree": "35b573715ad5730a77d067486838345132771a7a",
      "parents": [
        "24e1c13c93cbdd05e4b7ea921c0050b036555adc"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Thu Jan 10 04:20:52 2008 -0500"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Fri Feb 01 14:04:59 2008 -0500"
      },
      "message": "[PATCH] switch audit_get_loginuid() to task_struct *\n\nall callers pass something-\u003eaudit_context\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "9472c9ef645d03ea823801d7716e658aeaf894e4",
      "tree": "349327bc0ea264312a2d753840e7c32590e4f6c8",
      "parents": [
        "5255dc6e14ce640ccb3e062362510a00ac59bbcd"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Thu Jan 31 17:14:58 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:28:30 2008 -0800"
      },
      "message": "[XFRM]: Fix statistics.\n\no Outbound sequence number overflow error status\n  is counted as XfrmOutStateSeqError.\no Additionaly, it changes inbound sequence number replay\n  error name from XfrmInSeqOutOfWindow to XfrmInStateSeqError\n  to apply name scheme above.\no Inbound IPv4 UDP encapsuling type mismatch error is wrongly\n  mapped to XfrmInStateInvalid then this patch fiex the error\n  to XfrmInStateMismatch.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5255dc6e14ce640ccb3e062362510a00ac59bbcd",
      "tree": "fe8799b5c48dcb2a39629f103e3053fffc113026",
      "parents": [
        "cc8fd14dcaad61be74cbd5879f27a76f91473a3f"
      ],
      "author": {
        "name": "Adrian Bunk",
        "email": "bunk@kernel.org",
        "time": "Thu Jan 31 17:10:30 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:28:29 2008 -0800"
      },
      "message": "[XFRM]: Remove unused exports.\n\nThis patch removes the following no longer used EXPORT_SYMBOL\u0027s:\n- xfrm_input.c: xfrm_parse_spi\n- xfrm_state.c: xfrm_replay_check\n- xfrm_state.c: xfrm_replay_advance\n\nSigned-off-by: Adrian Bunk \u003cbunk@kernel.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "533cb5b0a63f28ecab5503cfceb77e641fa7f7c4",
      "tree": "62e7d7c65776c5fb30a8ff10fb3049e63257331c",
      "parents": [
        "2216b48376c40cf6984398d478a01b55e76c5434"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Wed Jan 30 19:11:50 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:27:20 2008 -0800"
      },
      "message": "[XFRM]: constify \u0027struct xfrm_type\u0027\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1a6509d991225ad210de54c63314fd9542922095",
      "tree": "afe5c560388558bebd3e21b7c6f789a28a323a51",
      "parents": [
        "6fbf2cb77461a0cd0675228d20dd0f70d7b2251f"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Jan 28 19:37:29 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:27:03 2008 -0800"
      },
      "message": "[IPSEC]: Add support for combined mode algorithms\n\nThis patch adds support for combined mode algorithms with GCM being\nthe first algorithm supported.\n\nCombined mode algorithms can be added through the xfrm_user interface\nusing the new algorithm payload type XFRMA_ALG_AEAD.  Each algorithms\nis identified by its name and the ICV length.\n\nFor the purposes of matching algorithms in xfrm_tmpl structures,\ncombined mode algorithms occupy the same name space as encryption\nalgorithms.  This is in line with how they are negotiated using IKE.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6fbf2cb77461a0cd0675228d20dd0f70d7b2251f",
      "tree": "42f95202bb4095eaf9f498519d8ae63036214448",
      "parents": [
        "38320c70d282be1997a5204c7c7fe14c3aa6bfaa"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Jan 28 19:35:49 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:27:02 2008 -0800"
      },
      "message": "[IPSEC]: Allow async algorithms\n\nNow that ESP uses authenc we can turn on the support for async\nalgorithms in IPsec.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b7c6ba6eb1234e35a74fb8ba8123232a7b1ba9e4",
      "tree": "672c08c95229a6ac242ab12a5195dceddb0f3127",
      "parents": [
        "4f84d82f7a623f8641af2574425c329431ff158f"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Mon Jan 28 14:41:19 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:08:07 2008 -0800"
      },
      "message": "[NETNS]: Consolidate kernel netlink socket destruction.\n\nCreate a specific helper for netlink kernel socket disposal. This just\nlet the code look better and provides a ground for proper disposal\ninside a namespace.\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nTested-by: Alexey Dobriyan \u003cadobriyan@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1486cbd777316e55aa30aeb37e231ce618c29d2e",
      "tree": "f53c510b99b1d06bcecb396c6e11f75c56ca335c",
      "parents": [
        "cea14e0ed6082bd3dff19203d01340de6e7ca067"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Sat Jan 12 03:20:03 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:01:49 2008 -0800"
      },
      "message": "[XFRM] xfrm_policy: kill some bloat\n\nnet/xfrm/xfrm_policy.c:\n  xfrm_audit_policy_delete | -692\n  xfrm_audit_policy_add    | -692\n 2 functions changed, 1384 bytes removed, diff: -1384\n\nnet/xfrm/xfrm_policy.c:\n  xfrm_audit_common_policyinfo | +704\n 1 function changed, 704 bytes added, diff: +704\n\nnet/xfrm/xfrm_policy.o:\n 3 functions changed, 704 bytes added, 1384 bytes removed, diff: -680\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "50dd79653e295ce40da38c03bbfb5966aa1c1598",
      "tree": "c96cee5292a6d335978d578043a6c436d42e7ad3",
      "parents": [
        "06eaa1a01d033bd5fd298b010334034f93021fbe"
      ],
      "author": {
        "name": "Sebastian Siewior",
        "email": "sebastian@breakpoint.cc",
        "time": "Wed Jan 09 00:36:17 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:01:12 2008 -0800"
      },
      "message": "[XFRM]: Remove ifdef crypto.\n\nand select the crypto subsystem if neccessary\n\nSigned-off-by: Sebastian Siewior \u003csebastian@breakpoint.cc\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6666351df90656677723f8232b3fdd26a500e51e",
      "tree": "bdbc17a38c257153e9f70fed37cc06c643644648",
      "parents": [
        "40ccbf525e55fc6d1f3a88c1e98b13db4dd618db"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Tue Jan 08 01:35:52 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:49 2008 -0800"
      },
      "message": "[XFRM]: xfrm_state_clone() should be static, not exported\n\nxfrm_state_clone() is not used outside of net/xfrm/xfrm_state.c\nThere is no need to export it.\n\nSpoted by sparse checker.\n   CHECK   net/xfrm/xfrm_state.c\nnet/xfrm/xfrm_state.c:1103:19: warning: symbol \u0027xfrm_state_clone\u0027 was not\ndeclared. Should it be static?\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "64c31b3f76482bb64459e786f9eca3bd0164d153",
      "tree": "4f8fa9e23dbb2b2a73c4516263c983b01cff4f3a",
      "parents": [
        "d66e37a99d323012165ce91fd5c4518e2fcea0c5"
      ],
      "author": {
        "name": "WANG Cong",
        "email": "xiyou.wangcong@gmail.com",
        "time": "Mon Jan 07 22:34:29 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:46 2008 -0800"
      },
      "message": "[XFRM] xfrm_policy_destroy: Rename and relative fixes.\n\nSince __xfrm_policy_destroy is used to destory the resources\nallocated by xfrm_policy_alloc. So using the name\n__xfrm_policy_destroy is not correspond with xfrm_policy_alloc.\nRename it to xfrm_policy_destroy.\n\nAnd along with some instances that call xfrm_policy_alloc\nbut not using xfrm_policy_destroy to destroy the resource,\nfix them.\n\nSigned-off-by: WANG Cong \u003cxiyou.wangcong@gmail.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d66e37a99d323012165ce91fd5c4518e2fcea0c5",
      "tree": "8b4d420f207864ac65bcc5d4f5af1b3a8cde6cf2",
      "parents": [
        "a067d9ac39cd207b5a0994c73199a56e7d5a17a3"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Mon Jan 07 21:46:15 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:45 2008 -0800"
      },
      "message": "[XFRM] Statistics: Add outbound-dropping error.\n\no Increment PolError counter when flow_cache_lookup() returns\n  errored pointer.\n\no Increment NoStates counter at larval-drop.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cf35f43e6e41b160d8dedd80a127210fd3be9ada",
      "tree": "98489c87532e0d3014217fe756907339a4bd6285",
      "parents": [
        "ad1b30b1c282bc8c726a9b123a1312a3930bcd42"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Sat Jan 05 23:13:20 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:43 2008 -0800"
      },
      "message": "[XFRM]: Kill some bloat\n\nnet/xfrm/xfrm_state.c:\n  xfrm_audit_state_delete          | -589\n  xfrm_replay_check                | -542\n  xfrm_audit_state_icvfail         | -520\n  xfrm_audit_state_add             | -589\n  xfrm_audit_state_replay_overflow | -523\n  xfrm_audit_state_notfound_simple | -509\n  xfrm_audit_state_notfound        | -521\n 7 functions changed, 3793 bytes removed, diff: -3793\n\nnet/xfrm/xfrm_state.c:\n  xfrm_audit_helper_pktinfo | +522\n  xfrm_audit_helper_sainfo  | +598\n 2 functions changed, 1120 bytes added, diff: +1120\n\nnet/xfrm/xfrm_state.o:\n 9 functions changed, 1120 bytes added, 3793 bytes removed, diff: -2673\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "dbb1db8b59fb84d620ab5266366b52c8052ee75c",
      "tree": "3df775d08d9bf81494c184e2b6dc7390dbe0de54",
      "parents": [
        "9a429c4983deae020f1e757ecc8f547b6d4e2f2b"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Jan 01 23:52:59 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:32 2008 -0800"
      },
      "message": "[IPSEC]: Return EOVERFLOW when output sequence number overflows\n\nPreviously we made it an error on the output path if the sequence number\noverflowed.  However we did not set the err variable accordingly.  This\npatch sets err to -EOVERFLOW in that case.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9a429c4983deae020f1e757ecc8f547b6d4e2f2b",
      "tree": "172e27a5866e182b902cd77506df1755aafadb60",
      "parents": [
        "b950dfcf504842a0f2bb142a33ef938f1c00d300"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Tue Jan 01 21:58:02 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:31 2008 -0800"
      },
      "message": "[NET]: Add some acquires/releases sparse annotations.\n\nAdd __acquires() and __releases() annotations to suppress some sparse\nwarnings.\n\nexample of warnings :\n\nnet/ipv4/udp.c:1555:14: warning: context imbalance in \u0027udp_seq_start\u0027 - wrong\ncount at exit\nnet/ipv4/udp.c:1571:13: warning: context imbalance in \u0027udp_seq_stop\u0027 -\nunexpected unlock\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9dd3245a2ac1834797191072705015e6a12f55bf",
      "tree": "b8f05a146de3729698ef7627e68251ee68a2a472",
      "parents": [
        "0883ae0e5599656b5f3b0e9ce474e01dee7dfee4"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Dec 30 21:10:30 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:10 2008 -0800"
      },
      "message": "[IPSEC]: Move all calls to xfrm_audit_state_icvfail to xfrm_input\n\nLet\u0027s nip the code duplication in the bud :)\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fcb8c156c8277ee9d71c8c81587d494c9c5240b3",
      "tree": "49ee171a80205f7c8d9cd9ae4e02955b547d11e6",
      "parents": [
        "15ca36fb994923b454df44e5d7aa14b84ce5aee4"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Dec 30 21:09:38 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:09 2008 -0800"
      },
      "message": "[IPSEC]: Fix double free on skb on async output\n\nWhen the output transform returns EINPROGRESS due to async operation we\u0027ll\nfree the skb the straight away as if it were an error.  This patch fixes\nthat so that the skb is freed when the async operation completes.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b15c4bcd15741b31019379298edfca28dc78029d",
      "tree": "714ec07cf667fdc3ab2a8655e7f65f2ecb96ba2e",
      "parents": [
        "426b5303eb435d98b9bee37a807be386bc2b3320"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Mon Dec 24 16:00:09 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:04 2008 -0800"
      },
      "message": "[XFRM]: Fix outbound statistics.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e1af9f270b69a3ad1dcbabb404dd1f40a96f43f5",
      "tree": "8dc77b5c842a517d0d19bba835897846f77ec647",
      "parents": [
        "afeb14b49098ba7a51c96e083a4105a0301f94c4"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Fri Dec 21 14:59:08 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:02 2008 -0800"
      },
      "message": "[XFRM]: Drop packets when replay counter would overflow\n\nAccording to RFC4303, section 3.3.3 we need to drop outgoing packets which\ncause the replay counter to overflow:\n\n   3.3.3.  Sequence Number Generation\n\n   The sender\u0027s counter is initialized to 0 when an SA is established.\n   The sender increments the sequence number (or ESN) counter for this\n   SA and inserts the low-order 32 bits of the value into the Sequence\n   Number field.  Thus, the first packet sent using a given SA will\n   contain a sequence number of 1.\n\n   If anti-replay is enabled (the default), the sender checks to ensure\n   that the counter has not cycled before inserting the new value in the\n   Sequence Number field.  In other words, the sender MUST NOT send a\n   packet on an SA if doing so would cause the sequence number to cycle.\n   An attempt to transmit a packet that would result in sequence number\n   overflow is an auditable event.  The audit log entry for this event\n   SHOULD include the SPI value, current date/time, Source Address,\n   Destination Address, and (in IPv6) the cleartext Flow ID.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "afeb14b49098ba7a51c96e083a4105a0301f94c4",
      "tree": "2675451596adbea8aa261704c356d074136abbbd",
      "parents": [
        "dfd4f0ae2e111e2b93c295938c0e64ebbb69ae6e"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Fri Dec 21 14:58:11 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:01 2008 -0800"
      },
      "message": "[XFRM]: RFC4303 compliant auditing\n\nThis patch adds a number of new IPsec audit events to meet the auditing\nrequirements of RFC4303.  This includes audit hooks for the following events:\n\n * Could not find a valid SA [sections 2.1, 3.4.2]\n   . xfrm_audit_state_notfound()\n   . xfrm_audit_state_notfound_simple()\n\n * Sequence number overflow [section 3.3.3]\n   . xfrm_audit_state_replay_overflow()\n\n * Replayed packet [section 3.4.3]\n   . xfrm_audit_state_replay()\n\n * Integrity check failure [sections 3.4.4.1, 3.4.4.2]\n   . xfrm_audit_state_icvfail()\n\nWhile RFC4304 deals only with ESP most of the changes in this patch apply to\nIPsec in general, i.e. both AH and ESP.  The one case, integrity check\nfailure, where ESP specific code had to be modified the same was done to the\nAH code for the sake of consistency.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "68277accb3a5f004344f4346498640601b8b7016",
      "tree": "e6b541283a516406fbd936051028845a20f5a7c4",
      "parents": [
        "8ea843495df36036cb7f22f61994b34f8362b443"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Thu Dec 20 20:49:33 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:40 2008 -0800"
      },
      "message": "[XFRM]: Assorted IPsec fixups\n\nThis patch fixes a number of small but potentially troublesome things in the\nXFRM/IPsec code:\n\n * Use the \u0027audit_enabled\u0027 variable already in include/linux/audit.h\n   Removed the need for extern declarations local to each XFRM audit fuction\n\n * Convert \u0027sid\u0027 to \u0027secid\u0027 everywhere we can\n   The \u0027sid\u0027 name is specific to SELinux, \u0027secid\u0027 is the common naming\n   convention used by the kernel when refering to tokenized LSM labels,\n   unfortunately we have to leave \u0027ctx_sid\u0027 in \u0027struct xfrm_sec_ctx\u0027 otherwise\n   we risk breaking userspace\n\n * Convert address display to use standard NIP* macros\n   Similar to what was recently done with the SPD audit code, this also also\n   includes the removal of some unnecessary memcpy() calls\n\n * Move common code to xfrm_audit_common_stateinfo()\n   Code consolidation from the \"less is more\" book on software development\n\n * Proper spacing around commas in function arguments\n   Minor style tweak since I was already touching the code\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8ea843495df36036cb7f22f61994b34f8362b443",
      "tree": "0038a215ddaedf1eab19969636a95ebc9ecb6694",
      "parents": [
        "0aa647746e5602e608220c10e51f49709a030f5d"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Thu Dec 20 20:44:02 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:39 2008 -0800"
      },
      "message": "[XFRM]: Add packet processing statistics option.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0aa647746e5602e608220c10e51f49709a030f5d",
      "tree": "514cde2ddf6308b0f1dfd83039cb8dd62b2c69d2",
      "parents": [
        "558f82ef6e0d25e87f7468c07b6db1fbbf95a855"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Thu Dec 20 20:43:36 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:39 2008 -0800"
      },
      "message": "[XFRM]: Support to increment packet dropping statistics.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "558f82ef6e0d25e87f7468c07b6db1fbbf95a855",
      "tree": "b2fe20926ca4e500b6e5c0232a5bf3b2e3ba898e",
      "parents": [
        "9473e1f631de339c50bde1e3bd09e1045fe90fd5"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Thu Dec 20 20:42:57 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:38 2008 -0800"
      },
      "message": "[XFRM]: Define packet dropping statistics.\n\nThis statistics is shown factor dropped by transformation\nat /proc/net/xfrm_stat for developer.\nIt is a counter designed from current transformation source code\nand defined as linux private MIB.\n\nSee Documentation/networking/xfrm_proc.txt for the detail.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a1b051405bc16222d92c73b0c26d65b333a154ee",
      "tree": "2950e34bbb51838f8da3e1d03c8ee608d3b56f55",
      "parents": [
        "bd515c3e48ececd774eb3128e81b669dbbd32637"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Thu Dec 20 20:41:12 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:36 2008 -0800"
      },
      "message": "[XFRM] IPv6: Fix dst/routing check at transformation.\n\nIPv6 specific thing is wrongly removed from transformation at net-2.6.25.\nThis patch recovers it with current design.\n\no Update \"path\" of xfrm_dst since IPv6 transformation should\n  care about routing changes. It is required by MIPv6 and\n  off-link destined IPsec.\no Rename nfheader_len which is for non-fragment transformation used by\n  MIPv6 to rt6i_nfheader_len as IPv6 name space.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "910ef70aa301eb018255683499b8e51426c213a0",
      "tree": "ccde31a2c581c1f9ddea0c482f22ce72a9293f0e",
      "parents": [
        "33b8e776056202aceaf4c90f465d0f4ee53432ac"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Dec 18 22:14:25 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:13 2008 -0800"
      },
      "message": "[IPSEC]: Do xfrm_state_check_space before encapsulation\n\nWhile merging the IPsec output path I moved the encapsulation output\noperation to the top of the loop so that it sits outside of the locked\nsection.  Unfortunately in doing so it now sits in front of the space\ncheck as well which could be a fatal error.\n\nThis patch rearranges the calls so that the space check happens as\nthe thing on the output path.\n\nThis patch also fixes an incorrect goto should the encapsulation output\nfail.\n\nThanks to Kazunori MIYAZAWA for finding this bug.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4bda4f250d21c3e4f2a2da5f4cef829a434a4046",
      "tree": "2632bc368ceab622cf119ef5aee154617fe43f1c",
      "parents": [
        "5e41fb83216d370d158fe17675af82d12c6c72c9"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Fri Dec 14 11:38:04 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:58:07 2008 -0800"
      },
      "message": "[XFRM]: Fix potential race vs xfrm_state(only)_find and xfrm_hash_resize.\n\nThe _find calls calculate the hash value using the\nxfrm_state_hmask, without the xfrm_state_lock. But the\nvalue of this mask can change in the _resize call under\nthe state_lock, so we risk to fail in finding the desired\nentry in hash.\n\nI think, that the hash value is better to calculate\nunder the state lock.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "aef21785995778f710a60b563e03bf53ba455a47",
      "tree": "5deeca8578e5b8d0198144b9dc2b281f8789a3df",
      "parents": [
        "cf86314cb7460423b0b7e611edad80a52dc90d10"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Dec 13 09:30:59 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:54 2008 -0800"
      },
      "message": "[IPSEC]: Fix zero return value in xfrm_lookup on error\n\nFurther testing shows that my ICMP relookup patch can cause xfrm_lookup\nto return zero on error which isn\u0027t very nice since it leads to the caller\ndying on null pointer dereference.  The bug is due to not setting err\nto ENOENT just before we leave xfrm_lookup in case of no policy.\n\nThis patch moves the err setting to where it should be.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8b7817f3a959ed99d7443afc12f78a7e1fcc2063",
      "tree": "7e315dfbf5c77e67f6e7ad56f14eaddca621212b",
      "parents": [
        "d5422efe680fc55010c6ddca2370ca9548a96355"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Dec 12 10:44:43 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:23 2008 -0800"
      },
      "message": "[IPSEC]: Add ICMP host relookup support\n\nRFC 4301 requires us to relookup ICMP traffic that does not match any\npolicies using the reverse of its payload.  This patch implements this\nfor ICMP traffic that originates from or terminates on localhost.\n\nThis is activated on outbound with the new policy flag XFRM_POLICY_ICMP,\nand on inbound by the new state flag XFRM_STATE_ICMP.\n\nOn inbound the policy check is now performed by the ICMP protocol so\nthat it can repeat the policy check where necessary.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d5422efe680fc55010c6ddca2370ca9548a96355",
      "tree": "f72fa5eb779c8ae7d49688a9caac9b69a1f3bd58",
      "parents": [
        "815f4e57e9fc67456624ecde0515a901368c78d2"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Dec 12 10:44:16 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:22 2008 -0800"
      },
      "message": "[IPSEC]: Added xfrm_decode_session_reverse and xfrmX_policy_check_reverse\n\nRFC 4301 requires us to relookup ICMP traffic that does not match any\npolicies using the reverse of its payload.  This patch adds the functions\nxfrm_decode_session_reverse and xfrmX_policy_check_reverse so we can get\nthe reverse flow to perform such a lookup.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "815f4e57e9fc67456624ecde0515a901368c78d2",
      "tree": "a93d4c3922d9711a6d29d909c8d79694c931e2a4",
      "parents": [
        "3f71c81ac37b27b824e9ce18fe17438dc2af4a16"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Dec 12 10:36:59 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:21 2008 -0800"
      },
      "message": "[IPSEC]: Make xfrm_lookup flags argument a bit-field\n\nThis patch introduces an enum for bits in the flags argument of xfrm_lookup.\nThis is so that we can cram more information into it later.\n\nSince all current users use just the values 0 and 1, XFRM_LOOKUP_WAIT has\nbeen added with the value 1 \u003c\u003c 0 to represent the current meaning of flags.\n\nThe test in __xfrm_lookup has been changed accordingly.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "005011211f559113686938c2c252b8ee1ab855b5",
      "tree": "a126bc8cbbfa9a263e06cc517fe3c1ae6f31af59",
      "parents": [
        "385ac2e3f226c09cb71733df1899658e33a7850f"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Dec 11 01:53:43 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:05 2008 -0800"
      },
      "message": "[IPSEC]: Add xfrm_input_state helper\n\nThis patch adds the xfrm_input_state helper function which returns the\ncurrent xfrm state being processed on the input path given an sk_buff.\nThis is currently only used by xfrm_input but will be used by ESP upon\nasynchronous resumption.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "df01812eba19834e48abd43246abedfbc4feeb7e",
      "tree": "c178f29cca560d9549a1e1a7270b2d532316b058",
      "parents": [
        "0e3cf7e9164048b79e7375bd66c9ef350e5b5bd7"
      ],
      "author": {
        "name": "Denis Cheng",
        "email": "crquan@gmail.com",
        "time": "Fri Dec 07 00:51:11 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:56:54 2008 -0800"
      },
      "message": "[XFRM] net/xfrm/xfrm_state.c: use LIST_HEAD instead of LIST_HEAD_INIT\n\nsingle list_head variable initialized with LIST_HEAD_INIT could almost\nalways can be replaced with LIST_HEAD declaration, this shrinks the code\nand looks better.\n\nSigned-off-by: Denis Cheng \u003ccrquan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5a3e55d68ec5baac578bf32ba67607088c763657",
      "tree": "9e8f9dfae66c8a85735122ece8a9c85cdb5c31c4",
      "parents": [
        "b84a2189c4e1835c51fd6b974a0497be9bc4ba87"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Fri Dec 07 00:38:10 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:56:44 2008 -0800"
      },
      "message": "[NET]: Multiple namespaces in the all dst_ifdown routines.\n\nMove dst entries to a namespace loopback to catch refcounting leaks.\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2fcb45b6b87914f072314e5b5d9c196f45984683",
      "tree": "e5a6cc4101a8b2693799fde9f47abaf480ae2dfc",
      "parents": [
        "bbca17680f82b1ba3122d41e8bc675aebf6d1cf2"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Dec 03 22:54:12 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:55:49 2008 -0800"
      },
      "message": "[IPSEC]: Use the correct family for input state lookup\n\nWhen merging the input paths of IPsec I accidentally left a hard-coded\nAF_INET for the state lookup call.  This broke IPv6 obviously.  This\npatch fixes by getting the input callers to specify the family through\nskb-\u003ecb.\n\nCredit goes to Kazunori Miyazawa for diagnosing this and providing an\ninitial patch.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "875179fa60ffe2eba1daaefb0af1be97ff5eda6a",
      "tree": "cc691e83f8dc2e022299362da49673fb31c2de55",
      "parents": [
        "9108d5f4b2cd82f55ad178caa0be66a866a06dcc"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Sat Dec 01 23:27:18 2007 +1100"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:55:19 2008 -0800"
      },
      "message": "[IPSEC]: SPD auditing fix to include the netmask/prefix-length\n\nCurrently the netmask/prefix-length of an IPsec SPD entry is not included in\nany of the SPD related audit messages.  This can cause a problem when the\naudit log is examined as the netmask/prefix-length is vital in determining\nwhat network traffic is affected by a particular SPD entry.  This patch fixes\nthis problem by adding two additional fields, \"src_prefixlen\" and\n\"dst_prefixlen\", to the SPD audit messages to indicate the source and\ndestination netmasks.  These new fields are only included in the audit message\nwhen the netmask/prefix-length is less than the address length, i.e. the SPD\nentry applies to a network address and not a host address.\n\nExample audit message:\n\n type\u003dUNKNOWN[1415] msg\u003daudit(1196105849.752:25): auid\u003d0 \\\n   subj\u003droot:system_r:unconfined_t:s0-s0:c0.c1023 op\u003dSPD-add res\u003d1 \\\n   src\u003d192.168.0.0 src_prefixlen\u003d24 dst\u003d192.168.1.0 dst_prefixlen\u003d24\n\nIn addition, this patch also fixes a few other things in the\nxfrm_audit_common_policyinfo() function.  The IPv4 string formatting was\nconverted to use the standard NIPQUAD_FMT constant, the memcpy() was removed\nfrom the IPv6 code path and replaced with a typecast (the memcpy() was acting\nas a slow, implicit typecast anyway), and two local variables were created to\nmake referencing the XFRM security context and selector information cleaner.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "dcaee95a1b396f85cdc28099f39710be328d3a5e",
      "tree": "2408c1ad351b4a12c2ab2423cd854cc67f4f4da8",
      "parents": [
        "8512430e554a84275669f78f86dce18566d5cf7a"
      ],
      "author": {
        "name": "Joonwoo Park",
        "email": "joonwpark81@gmail.com",
        "time": "Mon Nov 26 23:23:21 2007 +0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:55:05 2008 -0800"
      },
      "message": "[IPSEC]: kmalloc + memset conversion to kzalloc\n\n2007/11/26, Patrick McHardy \u003ckaber@trash.net\u003e:\n\u003e How about also switching vmalloc/get_free_pages to GFP_ZERO\n\u003e and getting rid of the memset entirely while you\u0027re at it?\n\u003e\n\nxfrm_hash: kmalloc + memset conversion to kzalloc\nfix to avoid memset entirely.\n\nSigned-off-by: Joonwoo Park \u003cjoonwpark81@gmail.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "294b4baf292197e13d1df1d253efa7ac84ffee3f",
      "tree": "f7f4fc0fa51e937829e2702faffa78b913895f99",
      "parents": [
        "6e23ae2a48750bda407a4a58f52a4865d7308bf5"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Nov 14 01:57:47 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:55 2008 -0800"
      },
      "message": "[IPSEC]: Kill afinfo-\u003enf_post_routing\n\nAfter changeset:\n\n\t[NETFILTER]: Introduce NF_INET_ hook values\n\nIt always evaluates to NF_INET_POST_ROUTING.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1bf06cd2e338fd6fc29169d30eaf0df982338285",
      "tree": "351bf1c8e5063fdfb8c820470972169d398729fe",
      "parents": [
        "60d5fcfb19d8a958fc563e52240cd05ec23f36c9"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 19 18:50:17 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:54 2008 -0800"
      },
      "message": "[IPSEC]: Add async resume support on input\n\nThis patch adds support for async resumptions on input.  To do so, the\ntransform would return -EINPROGRESS and subsequently invoke the\nfunction xfrm_input_resume to resume processing.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "60d5fcfb19d8a958fc563e52240cd05ec23f36c9",
      "tree": "f1bb64a18b1b183ad1cdf84f88a42a0b643af720",
      "parents": [
        "d26f398400311982d2433debae85746c348b7d58"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 19 18:47:58 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:53 2008 -0800"
      },
      "message": "[IPSEC]: Remove nhoff from xfrm_input\n\nThe nhoff field isn\u0027t actually necessary in xfrm_input.  For tunnel\nmode transforms we now throw away the output IP header so it makes no\nsense to fill in the nexthdr field.  For transport mode we can now let\nthe function transport_finish do the setting and it knows where the\nnexthdr field is.\n\nThe only other thing that needs the nexthdr field to be set is the\nheader extraction code.  However, we can simply move the protocol\nextraction out of the generic header extraction.\n\nWe want to minimise the amount of info we have to carry around between\ntransforms as this simplifies the resumption process for async crypto.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d26f398400311982d2433debae85746c348b7d58",
      "tree": "cd1fd0dfbd5a51428dc92ea3dbbb864205a27fa8",
      "parents": [
        "0ebea8ef3559b545c37b016f44e84c3b33e47c39"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:47:08 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:52 2008 -0800"
      },
      "message": "[IPSEC]: Make x-\u003elastused an unsigned long\n\nCurrently x-\u003elastused is u64 which means that it cannot be\nread/written atomically on all architectures.  David Miller observed\nthat the value stored in it is only an unsigned long which is always\natomic.\n\nSo based on his suggestion this patch changes the internal\nrepresentation from u64 to unsigned long while the user-interface\nstill refers to it as u64.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0ebea8ef3559b545c37b016f44e84c3b33e47c39",
      "tree": "7a47787c1b830084ac2d36371490b9e2574e2472",
      "parents": [
        "668dc8af3150f837f7f0461001bbbc0ce25d7bdf"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:45:58 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:52 2008 -0800"
      },
      "message": "[IPSEC]: Move state lock into x-\u003etype-\u003einput\n\nThis patch releases the lock on the state before calling\nx-\u003etype-\u003einput.  It also adds the lock to the spots where they\u0027re\ncurrently needed.\n\nMost of those places (all except mip6) are expected to disappear with\nasync crypto.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "668dc8af3150f837f7f0461001bbbc0ce25d7bdf",
      "tree": "9ba3534a190bb69b3aebf24aaa4340685fe16539",
      "parents": [
        "b2aa5e9d43a38dcdfa0878ed750cf32f98460278"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Dec 16 15:55:02 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:51 2008 -0800"
      },
      "message": "[IPSEC]: Move integrity stat collection into xfrm_input\n\nSimilar to the moving out of the replay processing on the output, this\npatch moves the integrity stat collectin from x-\u003etype-\u003einput into\nxfrm_input.\n\nThis would eventually allow transforms such as AH/ESP to be lockless.\n\nThe error value EBADMSG (currently unused in the crypto layer) is used\nto indicate a failed integrity check.  In future this error can be\ndirectly returned by the crypto layer once we switch to aead\nalgorithms.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b2aa5e9d43a38dcdfa0878ed750cf32f98460278",
      "tree": "e00544bd1aa0ab6e2ccb0696e1a89cd4900130e9",
      "parents": [
        "716062fd4c2f88a33ab409f62a1e7397ad0a7e33"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:44:55 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:50 2008 -0800"
      },
      "message": "[IPSEC]: Store xfrm states in security path directly\n\nAs it is xfrm_input first collects a list of xfrm states on the stack\nbefore storing them in the packet\u0027s security path just before it\nreturns.  For async crypto, this construction presents an obstacle\nsince we may need to leave the loop after each transform.\n\nIn fact, it\u0027s much easier to just skip the stack completely and always\nstore to the security path.  This is proven by the fact that this\npatch actually shrinks the code.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "716062fd4c2f88a33ab409f62a1e7397ad0a7e33",
      "tree": "73f2618fe99bca3870a0dbdc35acf6466ab3b976",
      "parents": [
        "c6581a457e661b7070e484ad723bbf555b17aca2"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:44:23 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:50 2008 -0800"
      },
      "message": "[IPSEC]: Merge most of the input path\n\nAs part of the work on asynchronous cryptographic operations, we need\nto be able to resume from the spot where they occur.  As such, it\nhelps if we isolate them to one spot.\n\nThis patch moves most of the remaining family-specific processing into\nthe common input code.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c6581a457e661b7070e484ad723bbf555b17aca2",
      "tree": "8562bded99fdee996e6b147d938057caf154f25b",
      "parents": [
        "862b82c6f960cc61274d370aa78ce1112f92a83e"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:43:43 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:49 2008 -0800"
      },
      "message": "[IPSEC]: Add async resume support on output\n\nThis patch adds support for async resumptions on output.  To do so,\nthe transform would return -EINPROGRESS and subsequently invoke the\nfunction xfrm_output_resume to resume processing.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "862b82c6f960cc61274d370aa78ce1112f92a83e",
      "tree": "51e252e1525dd7d02a695d428890a4c37fae2442",
      "parents": [
        "ef76bc23ef2acf20c8f7f841a542d8ab74c827c6"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:43:11 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:48 2008 -0800"
      },
      "message": "[IPSEC]: Merge most of the output path\n\nAs part of the work on asynchrnous cryptographic operations, we need\nto be able to resume from the spot where they occur.  As such, it\nhelps if we isolate them to one spot.\n\nThis patch moves most of the remaining family-specific processing into\nthe common output code.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "227620e295090629fcb2c46ad3828222ab65438d",
      "tree": "534162a74628fdfa7a8201cb776a45ca07510e5b",
      "parents": [
        "36cf9acf93e8561d9faec24849e57688a81eb9c5"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:41:28 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:46 2008 -0800"
      },
      "message": "[IPSEC]: Separate inner/outer mode processing on input\n\nWith inter-family transforms the inner mode differs from the outer\nmode.  Attempting to handle both sides from the same function means\nthat it needs to handle both IPv4 and IPv6 which creates duplication\nand confusion.\n\nThis patch separates the two parts on the input path so that each\nfunction deals with one family only.\n\nIn particular, the functions xfrm4_extract_inut/xfrm6_extract_inut\nmoves the pertinent fields from the IPv4/IPv6 IP headers into a\nneutral format stored in skb-\u003ecb.  This is then used by the inner mode\ninput functions to modify the inner IP header.  In this way the input\nfunction no longer has to know about the outer address family.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a2deb6d26f16ed7bf787dbd6a58c5d7be47d8db3",
      "tree": "a8c1ef4007cd8d419aa8d8a218092b00dcd64757",
      "parents": [
        "e40b3286158565909692e5914ea4a11bdbcc68c8"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:39:38 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:44 2008 -0800"
      },
      "message": "[IPSEC]: Move x-\u003eouter_mode-\u003eoutput out of locked section\n\nRO mode is the only one that requires a locked output function.  So\nit\u0027s easier to move the lock into that function rather than requiring\neveryone else to run under the lock.\n\nIn particular, this allows us to move the size check into the output\nfunction without causing a potential dead-lock should the ICMP error\nsomehow hit the same SA on transmission.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "25ee3286dcbc830a833354bb1d15567956844813",
      "tree": "bb5597d9e148f363bf0bbcd1a7269b5f677f0103",
      "parents": [
        "66cdb3ca27323a92712d289fc5edc7841d74a139"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Dec 11 09:32:34 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:43 2008 -0800"
      },
      "message": "[IPSEC]: Merge common code into xfrm_bundle_create\n\nHalf of the code in xfrm4_bundle_create and xfrm6_bundle_create are\ncommon.  This patch extracts that logic and puts it into\nxfrm_bundle_create.  The rest of it are then accessed through afinfo.\n\nAs a result this fixes the problem with inter-family transforms where\nwe treat every xfrm dst in the bundle as if it belongs to the top\nfamily.\n\nThis patch also fixes a long-standing error-path bug where we may free\nthe xfrm states twice.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "66cdb3ca27323a92712d289fc5edc7841d74a139",
      "tree": "443c864e4cab413743c3ca755a50f8a5d0ec300d",
      "parents": [
        "f04e7e8d7f175c05bbde3ae748bf2541da53721d"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:37:28 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:42 2008 -0800"
      },
      "message": "[IPSEC]: Move flow construction into xfrm_dst_lookup\n\nThis patch moves the flow construction from the callers of\nxfrm_dst_lookup into that function.  It also changes xfrm_dst_lookup\nso that it takes an xfrm state as its argument instead of explicit\naddresses.\n\nThis removes any address-specific logic from the callers of\nxfrm_dst_lookup which is needed to correctly support inter-family\ntransforms.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "550ade8432a2a6fbfb48ba7018750b0e8c81e8d0",
      "tree": "092838fb75d0352858dc473f32a78d1bc1db05f3",
      "parents": [
        "0148894223740da4818d7f4e6f92cbb5481a25b8"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:33:01 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:36 2008 -0800"
      },
      "message": "[IPSEC]: Use dst-\u003eheader_len when resizing on output\n\nCurrently we use x-\u003eprops.header_len when resizing on output.\nHowever, if we\u0027re resizing at all we might as well go the whole hog\nand do it for the whole dst.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b24b8a247ff65c01b252025926fe564209fae4fc",
      "tree": "8a9e0ea1e24b4733d8b9433d41877659505e9da4",
      "parents": [
        "a92aa318b4b369091fd80433c80e62838db8bc1c"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Wed Jan 23 21:20:07 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:35 2008 -0800"
      },
      "message": "[NET]: Convert init_timer into setup_timer\n\nMany-many code in the kernel initialized the timer-\u003efunction\nand  timer-\u003edata together with calling init_timer(timer). There\nis already a helper for this. Use it for networking code.\n\nThe patch is HUGE, but makes the code 130 lines shorter\n(98 insertions(+), 228 deletions(-)).\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nAcked-by: Arnaldo Carvalho de Melo \u003cacme@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0f99be0d115a5716292c58dfdb20d2eddd0f3387",
      "tree": "a4c8fc6262add152fa7207e40a5f02b18c9bedde",
      "parents": [
        "2e3884b5b16795c03a7bf295797c1b2402885b88"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Tue Jan 08 23:39:06 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jan 08 23:39:06 2008 -0800"
      },
      "message": "[XFRM]: xfrm_algo_clone() allocates too much memory\n\nalg_key_len is the length in bits of the key, not in bytes.\n\nBest way to fix this is to move alg_len() function from net/xfrm/xfrm_user.c \nto include/net/xfrm.h, and to use it in xfrm_algo_clone()\n\nalg_len() is renamed to xfrm_alg_len() because of its global exposition.\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2d60abc2a937bf77575c3b8c83faeeb84a84e654",
      "tree": "ecabc0dd8bacbb1d3152251cdc1ac8274c7aed24",
      "parents": [
        "76975f8a3186dae501584d0155ea410464f62815"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Thu Jan 03 20:43:21 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jan 04 00:47:03 2008 -0800"
      },
      "message": "[XFRM]: Do not define km_migrate() if !CONFIG_XFRM_MIGRATE\n\nIn include/net/xfrm.h we find :\n\n#ifdef CONFIG_XFRM_MIGRATE\nextern int km_migrate(struct xfrm_selector *sel, u8 dir, u8 type,\n                      struct xfrm_migrate *m, int num_bundles);\n...\n#endif\n\nWe can also guard the function body itself in net/xfrm/xfrm_state.c\nwith same condition.\n\n(Problem spoted by sparse checker)\nmake C\u003d2 net/xfrm/xfrm_state.o\n...\nnet/xfrm/xfrm_state.c:1765:5: warning: symbol \u0027km_migrate\u0027 was not declared. Should it be static?\n...\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5951cab136d8b7e84696061dc2e69c402bc94f61",
      "tree": "c00828fa48d9d02f992da23619feaafef41498bb",
      "parents": [
        "f398035f2dec0a6150833b0bc105057953594edb"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Thu Dec 20 00:00:45 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 20 00:00:45 2007 -0800"
      },
      "message": "[XFRM]: Audit function arguments misordered\n\nIn several places the arguments to the xfrm_audit_start() function are\nin the wrong order resulting in incorrect user information being\nreported.  This patch corrects this by pacing the arguments in the\ncorrect order.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9ab4c954ce2b2b3c485bee7e425fda05946893be",
      "tree": "111c1cd3b765d06fd42325b1904a2289297142a8",
      "parents": [
        "a18aa31b7774d8b36048e256a02d9d689533fc96"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Wed Dec 12 11:10:16 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 14 13:54:35 2007 -0800"
      },
      "message": "[XFRM]: Display the audited SPI value in host byte order.\n\nCurrently the IPsec protocol SPI values are written to the audit log in\nnetwork byte order which is different from almost all other values which\nare recorded in host byte order.  This patch corrects this inconsistency\nby writing the SPI values to the audit record in host byte order.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "75b8c133267053c9986a7c8db5131f0e7349e806",
      "tree": "264a44a1882196c894f1af84baf7fbba7698678c",
      "parents": [
        "3f03e387893ffa07a4d5dac96772f9db3221a185"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Dec 11 04:38:08 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Dec 11 04:38:08 2007 -0800"
      },
      "message": "[IPSEC]: Fix potential dst leak in xfrm_lookup\n\nIf we get an error during the actual policy lookup we don\u0027t free the\noriginal dst while the caller expects us to always free the original\ndst in case of error.\n\nThis patch fixes that.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5e5234ff17ef98932688116025b30958bd28a940",
      "tree": "c14918fe21d01eeda770856aff55dc2363fd69a2",
      "parents": [
        "076931989fe96823a577259cc6bc205d7ec31754"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 00:50:31 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 00:50:31 2007 +1100"
      },
      "message": "[IPSEC]: Fix uninitialised dst warning in __xfrm_lookup\n\nAndrew Morton reported that __xfrm_lookup generates this warning:\n\nnet/xfrm/xfrm_policy.c: In function \u0027__xfrm_lookup\u0027:\nnet/xfrm/xfrm_policy.c:1449: warning: \u0027dst\u0027 may be used uninitialized in this function\n\nThis is because if policy-\u003eaction is of an unexpected value then dst will\nnot be initialised.  Of course, in practice this should never happen since\nthe input layer xfrm_user/af_key will filter out all illegal values.  But\nthe compiler doesn\u0027t know that of course.\n\nSo this patch fixes this by taking the conservative approach and treat all\nunknown actions the same as a blocking action.\n\nThanks to Andrew for finding this and providing an initial fix.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    }
  ],
  "next": "5dba4797115c8fa05c1a4d12927a6ae0b33ffc41"
}
