)]}'
{
  "log": [
    {
      "commit": "cd40b7d3983c708aabe3d3008ec64ffce56d33b0",
      "tree": "0d6fe9cfd2f03fdeee126e317d4bfb145afc458d",
      "parents": [
        "aed815601f3f95281ab3a01f7e2cbe1bd54285a0"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Wed Oct 10 21:15:29 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 10 21:15:29 2007 -0700"
      },
      "message": "[NET]: make netlink user -\u003e kernel interface synchronious\n\nThis patch make processing netlink user -\u003e kernel messages synchronious.\nThis change was inspired by the talk with Alexey Kuznetsov about current\nnetlink messages processing. He says that he was badly wrong when introduced \nasynchronious user -\u003e kernel communication.\n\nThe call netlink_unicast is the only path to send message to the kernel\nnetlink socket. But, unfortunately, it is also used to send data to the\nuser.\n\nBefore this change the user message has been attached to the socket queue\nand sk-\u003esk_data_ready was called. The process has been blocked until all\npending messages were processed. The bad thing is that this processing\nmay occur in the arbitrary process context.\n\nThis patch changes nlk-\u003edata_ready callback to get 1 skb and force packet\nprocessing right in the netlink_unicast.\n\nKernel -\u003e user path in netlink_unicast remains untouched.\n\nEINTR processing for in netlink_run_queue was changed. It forces rtnl_lock\ndrop, but the process remains in the cycle until the message will be fully\nprocessed. So, there is no need to use this kludges now.\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nAcked-by: Alexey Kuznetsov \u003ckuznet@ms2.inr.ac.ru\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b7c6538cd84f8072fad43bfce530f5bf695edbba",
      "tree": "e0ba79ffe7b79355985a45de9961b17a0462764f",
      "parents": [
        "050f009e16f908932070313c1745d09dc69fd62b"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:33:35 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:03 2007 -0700"
      },
      "message": "[IPSEC]: Move state lock into x-\u003etype-\u003eoutput\n\nThis patch releases the lock on the state before calling x-\u003etype-\u003eoutput.\nIt also adds the lock to the spots where they\u0027re currently needed.\n\nMost of those places (all except mip6) are expected to disappear with\nasync crypto.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "050f009e16f908932070313c1745d09dc69fd62b",
      "tree": "2176b8034065bf2e8b401865efcfaab912bb1997",
      "parents": [
        "68325d3b12ad5bce650c2883bb878257f197efff"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:31:47 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:02 2007 -0700"
      },
      "message": "[IPSEC]: Lock state when copying non-atomic fields to user-space\n\nThis patch adds locking so that when we\u0027re copying non-atomic fields such as\nlife-time or coaddr to user-space we don\u0027t get a partial result.\n\nFor af_key I\u0027ve changed every instance of pfkey_xfrm_state2msg apart from\nexpiration notification to include the keys and life-times.  This is in-line\nwith XFRM behaviour.\n\nThe actual cases affected are:\n\n* pfkey_getspi: No change as we don\u0027t have any keys to copy.\n* key_notify_sa:\n\t+ ADD/UPD: This wouldn\u0027t work otherwise.\n\t+ DEL: It can\u0027t hurt.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "68325d3b12ad5bce650c2883bb878257f197efff",
      "tree": "c6d15e03e017599b07742d0a8453e4ee8ee253e3",
      "parents": [
        "658b219e9379d75fbdc578b9630b598098471258"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:30:57 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:02 2007 -0700"
      },
      "message": "[XFRM] user: Move attribute copying code into copy_to_user_state_extra\n\nHere\u0027s a good example of code duplication leading to code rot.  The\nnotification patch did its own netlink message creation for xfrm states.\nIt duplicated code that was already in dump_one_state.  Guess what, the\nnext time (and the time after) when someone updated dump_one_state the\nnotification path got zilch.\n\nThis patch moves that code from dump_one_state to copy_to_user_state_extra\nand uses it in xfrm_notify_sa too.  Unfortunately whoever updates this\nstill needs to update xfrm_sa_len since the notification path wants to\nknow the exact size for allocation.\n\nAt least I\u0027ve added a comment saying so and if someone still forgest, we\u0027ll\nhave a WARN_ON telling us so.\n\nI also changed the security size calculation to use xfrm_user_sec_ctx since\nthat\u0027s what we actually put into the skb.  However it makes no practical\ndifference since it has the same size as xfrm_sec_ctx.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "658b219e9379d75fbdc578b9630b598098471258",
      "tree": "fe802c4e1ee6468a9c2558a5e529b2380845a003",
      "parents": [
        "75ba28c633952f7994a7117c98ae6515b58f8d30"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:29:52 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:01 2007 -0700"
      },
      "message": "[IPSEC]: Move common code into xfrm_alloc_spi\n\nThis patch moves some common code that conceptually belongs to the xfrm core\nfrom af_key/xfrm_user into xfrm_alloc_spi.\n\nIn particular, the spin lock on the state is now taken inside xfrm_alloc_spi.\nPreviously it also protected the construction of the response PF_KEY/XFRM\nmessages to user-space.  This is inconsistent as other identical constructions\nare not protected by the state lock.  This is bad because they in fact should\nbe protected but only in certain spots (so as not to hold the lock for too\nlong which may cause packet drops).\n\nThe SPI byte order conversion has also been moved.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "75ba28c633952f7994a7117c98ae6515b58f8d30",
      "tree": "5be5d5a366595d1bbbc4f890358c3405425ca6c5",
      "parents": [
        "007f0211a8872f32381f5d44becf8eb2f27f3c30"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:27:27 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:01 2007 -0700"
      },
      "message": "[IPSEC]: Remove gratuitous km wake-up events on ACQUIRE\n\nThere is no point in waking people up when creating/updating larval states\nbecause they\u0027ll just go back to sleep again as larval states by definition\ncannot be found by xfrm_state_find.\n\nWe should only wake them up when the larvals mature or die.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "007f0211a8872f32381f5d44becf8eb2f27f3c30",
      "tree": "9f6879726b6f016379368ebbde6ce3ec13faaa39",
      "parents": [
        "1ecafede835321ebdc396531245adc37d22366f7"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:25:59 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:00 2007 -0700"
      },
      "message": "[IPSEC]: Store IPv6 nh pointer in mac_header on output\n\nCurrent the x-\u003emode-\u003eoutput functions store the IPv6 nh pointer in the\nskb network header.  This is inconvenient because the network header then\nhas to be fixed up before the packet can leave the IPsec stack.  The mac\nheader field is unused on output so we can use that to store this instead.\n\nThis patch does that and removes the network header fix-up in xfrm_output.\n\nIt also uses ipv6_hdr where appropriate in the x-\u003etype-\u003eoutput functions.\n\nThere is also a minor clean-up in esp4 to make it use the same code as\nesp6 to help any subsequent effort to merge the two.\n\nLastly it kills two redundant skb_set_* statements in BEET that were\nsimply copied over from transport mode.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1ecafede835321ebdc396531245adc37d22366f7",
      "tree": "230419433b8a08b86abf8998da84652c66c3b20e",
      "parents": [
        "32f0c4cbe495d121c09ed14d9c84f9e1b9574415"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:24:07 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:54:59 2007 -0700"
      },
      "message": "[IPSEC]: Remove bogus ref count in xfrm_secpath_reject\n\nConstructs of the form\n\n\txfrm_state_hold(x);\n\tfoo(x);\n\txfrm_state_put(x);\n\ntend to be broken because foo is either synchronous where this is totally\nunnecessary or if foo is asynchronous then the reference count is in the\nwrong spot.\n\nIn the case of xfrm_secpath_reject, the function is synchronous and therefore\nwe should just kill the reference count.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "45b17f48eaf5e5ff4202454985557b3240141caa",
      "tree": "00b0b9dc375899b5d1f8ee11f78ef5dcc9b1c2e1",
      "parents": [
        "cdf7e668d4327a33e11be04c4cb9bcc604eaaa0f"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Oct 08 17:27:19 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:54:56 2007 -0700"
      },
      "message": "[IPSEC]: Move RO-specific output code into xfrm6_mode_ro.c\n\nThe lastused update check in xfrm_output can be done just as well in\nthe mode output function which is specific to RO.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cdf7e668d4327a33e11be04c4cb9bcc604eaaa0f",
      "tree": "3ffa05d642ec702b73eb568894024b4787849faa",
      "parents": [
        "436a0a402203d5a47d2edf7e4dde6c08a7257983"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Oct 08 17:26:34 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:54:55 2007 -0700"
      },
      "message": "[IPSEC]: Unexport xfrm_replay_notify\n\nNow that the only callers of xfrm_replay_notify are in xfrm, we can remove\nthe export.\n\nThis patch also removes xfrm_aevent_doreplay since it\u0027s now called in just\none spot.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "436a0a402203d5a47d2edf7e4dde6c08a7257983",
      "tree": "b47e73326a2ff7dbf8ac3fbcb6c4acea5c06619d",
      "parents": [
        "83815dea47cf3e98ccbb6aecda08cba1ba91208f"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Oct 08 17:25:53 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:54:54 2007 -0700"
      },
      "message": "[IPSEC]: Move output replay code into xfrm_output\n\nThe replay counter is one of only two remaining things in the output code\nthat requires a lock on the xfrm state (the other being the crypto).  This\npatch moves it into the generic xfrm_output so we can remove the lock from\nthe transforms themselves.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "83815dea47cf3e98ccbb6aecda08cba1ba91208f",
      "tree": "6d728f3b26dc02685ec6c8eb5c08605adf9d2688",
      "parents": [
        "406ef77c893ebd882209be4e393d64b01fe72054"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Oct 08 17:25:08 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:54:54 2007 -0700"
      },
      "message": "[IPSEC]: Move xfrm_state_check into xfrm_output.c\n\nThe functions xfrm_state_check and xfrm_state_check_space are only used by\nthe output code in xfrm_output.c so we can move them over.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "406ef77c893ebd882209be4e393d64b01fe72054",
      "tree": "815d753889769b355fba7e648abef7ad1422559e",
      "parents": [
        "bc31d3b2c7d7f2a03721a05cb3c9a3ce8b1e2e5a"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Oct 08 17:16:30 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:54:53 2007 -0700"
      },
      "message": "[IPSEC]: Move common output code to xfrm_output\n\nMost of the code in xfrm4_output_one and xfrm6_output_one are identical so\nthis patch moves them into a common xfrm_output function which will live\nin net/xfrm.\n\nIn fact this would seem to fix a bug as on IPv4 we never reset the network\nheader after a transform which may upset netfilter later on.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2774c7aba6c97a2535be3309a2209770953780b3",
      "tree": "9327c795707f6d723c6395c31e1c060e70b5e0db",
      "parents": [
        "0cc217e16cb8ca8ef2544363571fce94259900e0"
      ],
      "author": {
        "name": "Eric W. Biederman",
        "email": "ebiederm@xmission.com",
        "time": "Wed Sep 26 22:10:56 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:52:49 2007 -0700"
      },
      "message": "[NET]: Make the loopback device per network namespace.\n\nThis patch makes loopback_dev per network namespace.  Adding\ncode to create a different loopback device for each network\nnamespace and adding the code to free a loopback device\nwhen a network namespace exits.\n\nThis patch modifies all users the loopback_dev so they\naccess it as init_net.loopback_dev, keeping all of the\ncode compiling and working.  A later pass will be needed to\nupdate the users to use something other than the initial network\nnamespace.\n\nSigned-off-by: Eric W. Biederman \u003cebiederm@xmission.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "de3cb747ffac5f2a4a6bb156e7e2fd5229e688e5",
      "tree": "fe79764b8093843934c9b9f82f573e7a92cef406",
      "parents": [
        "556829657397b9b05baec6691ead4e22ee8d1567"
      ],
      "author": {
        "name": "Daniel Lezcano",
        "email": "dlezcano@fr.ibm.com",
        "time": "Tue Sep 25 19:16:28 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:52:14 2007 -0700"
      },
      "message": "[NET]: Dynamically allocate the loopback device, part 1.\n\nThis patch replaces all occurences to the static variable\nloopback_dev to a pointer loopback_dev. That provides the\nmindless, trivial, uninteressting change part for the dynamic\nallocation for the loopback.\n\nSigned-off-by: Eric W. Biederman \u003cebiederm@xmission.com\u003e\nSigned-off-by: Daniel Lezcano \u003cdlezcano@fr.ibm.com\u003e\nAcked-By: Kirill Korotaev \u003cdev@sw.ru\u003e\nAcked-by: Benjamin Thery \u003cbenjamin.thery@bull.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0cfad07555312468296ea3bbbcdf99038f58678b",
      "tree": "a95c432bcafaf22e965dcaf27bfd4a61723d1d64",
      "parents": [
        "007e3936bdaaa012483c9fe06ca71c272458c710"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Sep 16 16:24:44 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:51:24 2007 -0700"
      },
      "message": "[NETLINK]: Avoid pointer in netlink_run_queue\n\nI was looking at Patrick\u0027s fix to inet_diag and it occured\nto me that we\u0027re using a pointer argument to return values\nunnecessarily in netlink_run_queue.  Changing it to return\nthe value will allow the compiler to generate better code\nsince the value won\u0027t have to be memory-backed.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b4b510290b056b86611757ce1175a230f1080f53",
      "tree": "7bd1d45855ac7457be6d50338c60751f19e436d9",
      "parents": [
        "e9dc86534051b78e41e5b746cccc291b57a3a311"
      ],
      "author": {
        "name": "Eric W. Biederman",
        "email": "ebiederm@xmission.com",
        "time": "Wed Sep 12 13:05:38 2007 +0200"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:49:09 2007 -0700"
      },
      "message": "[NET]: Support multiple network namespaces with netlink\n\nEach netlink socket will live in exactly one network namespace,\nthis includes the controlling kernel sockets.\n\nThis patch updates all of the existing netlink protocols\nto only support the initial network namespace.  Request\nby clients in other namespaces will get -ECONREFUSED.\nAs they would if the kernel did not have the support for\nthat netlink protocol compiled in.\n\nAs each netlink protocol is updated to be multiple network\nnamespace safe it can register multiple kernel sockets\nto acquire a presence in the rest of the network namespaces.\n\nThe implementation in af_netlink is a simple filter implementation\nat hash table insertion and hash table look up time.\n\nSigned-off-by: Eric W. Biederman \u003cebiederm@xmission.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e9dc86534051b78e41e5b746cccc291b57a3a311",
      "tree": "1cd4a1dde4c51b6311749428a22cc8a8f5436825",
      "parents": [
        "e730c15519d09ea528b4d2f1103681fa5937c0e6"
      ],
      "author": {
        "name": "Eric W. Biederman",
        "email": "ebiederm@xmission.com",
        "time": "Wed Sep 12 13:02:17 2007 +0200"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:49:09 2007 -0700"
      },
      "message": "[NET]: Make device event notification network namespace safe\n\nEvery user of the network device notifiers is either a protocol\nstack or a pseudo device.  If a protocol stack that does not have\nsupport for multiple network namespaces receives an event for a\ndevice that is not in the initial network namespace it quite possibly\ncan get confused and do the wrong thing.\n\nTo avoid problems until all of the protocol stacks are converted\nthis patch modifies all netdev event handlers to ignore events on\ndevices that are not in the initial network namespace.\n\nAs the rest of the code is made network namespace aware these\nchecks can be removed.\n\nSigned-off-by: Eric W. Biederman \u003cebiederm@xmission.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ab5f5e8b144e4c804ef3aa1ce08a9ca9f01187ce",
      "tree": "bf3915a618b29f507d882e9c665ed9d07e7c0765",
      "parents": [
        "d2e9117c7aa9544d910634e17e3519fd67155229"
      ],
      "author": {
        "name": "Joy Latten",
        "email": "latten@austin.ibm.com",
        "time": "Mon Sep 17 11:51:22 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:49:02 2007 -0700"
      },
      "message": "[XFRM]: xfrm audit calls\n\nThis patch modifies the current ipsec audit layer\nby breaking it up into purpose driven audit calls.\n\nSo far, the only audit calls made are when add/delete\nan SA/policy. It had been discussed to give each\nkey manager it\u0027s own calls to do this, but I found\nthere to be much redundnacy since they did the exact\nsame things, except for how they got auid and sid, so I\ncombined them. The below audit calls can be made by any\nkey manager. Hopefully, this is ok.\n\nSigned-off-by: Joy Latten \u003clatten@austin.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f7944fb1913130ae7858008af96e52a3a6b04118",
      "tree": "757d88e7c9ed3a423f27546e23104a8daee0a34b",
      "parents": [
        "3b26a9a655ee73a87071a9f6a1fdd5311e31d7c9"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Sat Aug 25 13:46:55 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:34 2007 -0700"
      },
      "message": "[XFRM] policy: Replace magic number with XFRM_POLICY_OUT\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fd21150a0fe10c504160db359a4eb425576f6e7d",
      "tree": "fb1c912e8cb1867216f30d0c34f3b1f5427896ac",
      "parents": [
        "15901a2746e6a2dbe03043609f1575c2bcf726e8"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Thu Sep 06 03:28:08 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:26 2007 -0700"
      },
      "message": "[XFRM] netlink: Inline attach_encap_tmpl(), attach_sec_ctx(), and attach_one_addr()\n\nThese functions are only used once and are a lot easier to understand if\ninlined directly into the function.\n\nFixes by Masahide NAKAMURA.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "15901a2746e6a2dbe03043609f1575c2bcf726e8",
      "tree": "94539e2063d37082002a108e3072e93c5d09cef1",
      "parents": [
        "5424f32e484b9697808bbc0c0088dc2ead018d4f"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 14:02:39 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:25 2007 -0700"
      },
      "message": "[XFRM] netlink: Remove dependency on rtnetlink\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5424f32e484b9697808bbc0c0088dc2ead018d4f",
      "tree": "91daf130e6816a7fc7bef89932e4df45fc26fec5",
      "parents": [
        "35a7aa08bf7863dbfdb0eb69122d8aeaedd52748"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 14:01:33 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:25 2007 -0700"
      },
      "message": "[XFRM] netlink: Use nlattr instead of rtattr\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "35a7aa08bf7863dbfdb0eb69122d8aeaedd52748",
      "tree": "50f9bbc59d77a5d55ecff851d27ae1af80f10491",
      "parents": [
        "fab448991df4ecca6c244e23982c70f7e715b864"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 14:00:40 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:24 2007 -0700"
      },
      "message": "[XFRM] netlink: Rename attribute array from xfrma[] to attrs[]\n\nIncreases readability a lot.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fab448991df4ecca6c244e23982c70f7e715b864",
      "tree": "f4f0dd583f2934da4bb4b1621dfebb03c9d6a5ba",
      "parents": [
        "cf5cb79f6946063b04be3df16dcaa781e48bdbef"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 13:59:43 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:23 2007 -0700"
      },
      "message": "[XFRM] netlink: Enhance indexing of the attribute array\n\nnlmsg_parse() puts attributes at array[type] so the indexing\nmethod can be simpilfied by removing the obscuring \"- 1\".\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cf5cb79f6946063b04be3df16dcaa781e48bdbef",
      "tree": "64471b7121109b91a76481a92f6b5c037e66c421",
      "parents": [
        "a7bd9a45c8c8901f800a461a4098ebae2b8a4b78"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 13:59:04 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:23 2007 -0700"
      },
      "message": "[XFRM] netlink: Establish an attribute policy\n\nAdds a policy defining the minimal payload lengths for all the attributes\nallowing for most attribute validation checks to be removed from in\nthe middle of the code path. Makes updates more consistent as many format\nerrors are recognised earlier, before any changes have been attempted.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a7bd9a45c8c8901f800a461a4098ebae2b8a4b78",
      "tree": "825a7864c856f3dceaa002143c6c4a63c031a35a",
      "parents": [
        "7deb2264909ec82ae4696dd73d8ffce6814c9114"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 13:58:18 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:22 2007 -0700"
      },
      "message": "[XFRM] netlink: Use nlmsg_parse() to parse attributes\n\nUses nlmsg_parse() to parse the attributes. This actually changes\nbehaviour as unknown attributes (type \u003e MAXTYPE) no longer cause\nan error. Instead unknown attributes will be ignored henceforth\nto keep older kernels compatible with more recent userspace tools.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7deb2264909ec82ae4696dd73d8ffce6814c9114",
      "tree": "bee682118f12c19c2cd8cbdfe89165a221bfdc77",
      "parents": [
        "cfbfd45a8c4c0c8dd8ed491caefdeffd94acf9e4"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 13:57:39 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:22 2007 -0700"
      },
      "message": "[XFRM] netlink: Use nlmsg_new() and type-safe size calculation helpers\n\nMoves all complex message size calculation into own inlined helper\nfunctions and makes use of the type-safe netlink interface.\n\nUsing nlmsg_new() simplifies the calculation itself as it takes care\nof the netlink header length by itself.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cfbfd45a8c4c0c8dd8ed491caefdeffd94acf9e4",
      "tree": "c027768fe0768e2b502260bdd2b93c9ddcdf785f",
      "parents": [
        "c26445acbc292ab0466407db6d3bdcc5cbe1d03b"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 13:57:04 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:21 2007 -0700"
      },
      "message": "[XFRM] netlink: Clear up some of the CONFIG_XFRM_SUB_POLICY ifdef mess\n\nMoves all of the SUB_POLICY ifdefs related to the attribute size\ncalculation into a function.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c26445acbc292ab0466407db6d3bdcc5cbe1d03b",
      "tree": "15cc1f7b56929ffd269d5960d130e5c30c47277b",
      "parents": [
        "c0144beaeca42b643f4d1632f2b24fdc6c48a170"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 13:56:23 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:21 2007 -0700"
      },
      "message": "[XFRM] netlink: Move algorithm length calculation to its own function\n\nAdds alg_len() to calculate the properly padded length of an\nalgorithm attribute to simplify the code.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c0144beaeca42b643f4d1632f2b24fdc6c48a170",
      "tree": "352de55fa8ca1bab087bf2d6809310d3d4965249",
      "parents": [
        "082a1ad573b76c8342c1da9d623aaeb5901e440b"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 13:55:43 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:20 2007 -0700"
      },
      "message": "[XFRM] netlink: Use nla_put()/NLA_PUT() variantes\n\nAlso makes use of copy_sec_ctx() in another place and removes\nduplicated code.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "082a1ad573b76c8342c1da9d623aaeb5901e440b",
      "tree": "9fe3248549913d1c770efab0c4107ad2af36b8cf",
      "parents": [
        "7b67c8575f1ed0d5fd7524a33d34f5c88c52a194"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 13:54:36 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:20 2007 -0700"
      },
      "message": "[XFRM] netlink: Use nlmsg_broadcast() and nlmsg_unicast()\n\nThis simplifies successful return codes from \u003e0 to 0.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7b67c8575f1ed0d5fd7524a33d34f5c88c52a194",
      "tree": "96bb75cdc5551011650ab5de7c817137bc79d2a2",
      "parents": [
        "9825069d09d0201e547e9ee3f3b990cddef68788"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 13:53:52 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:19 2007 -0700"
      },
      "message": "[XFRM] netlink: Use nlmsg_data() instead of NLMSG_DATA()\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9825069d09d0201e547e9ee3f3b990cddef68788",
      "tree": "bb97f7aafe040f282093d51791c83ab088660203",
      "parents": [
        "79b8b7f4ab686e0f14ceb9a6fa4437eb1e73a0e5"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 12:47:26 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:18 2007 -0700"
      },
      "message": "[XFRM] netlink: Use nlmsg_end() and nlmsg_cancel()\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "79b8b7f4ab686e0f14ceb9a6fa4437eb1e73a0e5",
      "tree": "5fd922b7eaff7c0e071c14c9f1ca96ee3d6fc800",
      "parents": [
        "6168b96c07d8d40f83622cfb488ca27e4178a603"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 12:46:53 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:18 2007 -0700"
      },
      "message": "[XFRM] netlink: Use nlmsg_put() instead of NLMSG_PUT()\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b5890d8ba47741425fe3c0d753e1b57bc0561b7b",
      "tree": "7aea57ceab0d7de85850fbe01394d5fa5a739390",
      "parents": [
        "897c77cab0c386103e1c51fe8f3fc7eb5d1eb37f"
      ],
      "author": {
        "name": "Jesper Juhl",
        "email": "jesper.juhl@gmail.com",
        "time": "Fri Aug 10 15:20:21 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Aug 13 22:52:08 2007 -0700"
      },
      "message": "[XFRM]: Clean up duplicate includes in net/xfrm/\n\nThis patch cleans up duplicate includes in\n\tnet/xfrm/\n\nSigned-off-by: Jesper Juhl \u003cjesper.juhl@gmail.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e6e0871cce2ae04f5790543ad2f4ec36b23260ba",
      "tree": "0af9d48482dbdb8b949fb673eb5bf48fd5611cc5",
      "parents": [
        "088999e98b8caecd31adc3b62223a228555c5ab7"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Wed Aug 01 11:12:59 2007 -0400"
      },
      "committer": {
        "name": "James Morris",
        "email": "jmorris@namei.org",
        "time": "Thu Aug 02 11:52:26 2007 -0400"
      },
      "message": "Net/Security: fix memory leaks from security_secid_to_secctx()\n\nThe security_secid_to_secctx() function returns memory that must be freed\nby a call to security_release_secctx() which was not always happening.  This\npatch fixes two of these problems (all that I could find in the kernel source\nat present).\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nAcked-by:  Stephen Smalley \u003csds@tycho.nsa.gov\u003e\nSigned-off-by: James Morris \u003cjmorris@namei.org\u003e\n"
    },
    {
      "commit": "48b8d78315bf2aef4b6b4fb41c2c94e0b6600234",
      "tree": "9cbb0f9eeec383e74063b1b52be85da5148adf4b",
      "parents": [
        "196b003620f1ee8d0fc63f13f341187d63c1dc0a"
      ],
      "author": {
        "name": "Joakim Koskela",
        "email": "jookos@gmail.com",
        "time": "Thu Jul 26 00:08:42 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Jul 31 02:28:33 2007 -0700"
      },
      "message": "[XFRM]: State selection update to use inner addresses.\n\nThis patch modifies the xfrm state selection logic to use the inner\naddresses where the outer have been (incorrectly) used. This is\nrequired for beet mode in general and interfamily setups in both\ntunnel and beet mode.\n\nSigned-off-by: Joakim Koskela \u003cjookos@gmail.com\u003e\nSigned-off-by: Herbert Xu     \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: Diego Beltrami \u003cdiego.beltrami@gmail.com\u003e\nSigned-off-by: Miika Komu     \u003cmiika@iki.fi\u003e\nAcked-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "196b003620f1ee8d0fc63f13f341187d63c1dc0a",
      "tree": "2710ea74dab44caa9d3405fc6d95a2663f253f16",
      "parents": [
        "b8ed601cefe7a4014b93560bd846caf44f25b1c1"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Jul 31 02:04:32 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Jul 31 02:28:32 2007 -0700"
      },
      "message": "[IPSEC]: Ensure that state inner family is set\n\nSimilar to the issue we had with template families which\nspecified the inner families of policies, we need to set\nthe inner families of states as the main xfrm user Openswan\nleaves it as zero.\n\naf_key is unaffected because the inner family is set by it\nand not the KM.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "20c2df83d25c6a95affe6157a4c9cac4cf5ffaac",
      "tree": "415c4453d2b17a50abe7a3e515177e1fa337bd67",
      "parents": [
        "64fb98fc40738ae1a98bcea9ca3145b89fb71524"
      ],
      "author": {
        "name": "Paul Mundt",
        "email": "lethal@linux-sh.org",
        "time": "Fri Jul 20 10:11:58 2007 +0900"
      },
      "committer": {
        "name": "Paul Mundt",
        "email": "lethal@linux-sh.org",
        "time": "Fri Jul 20 10:11:58 2007 +0900"
      },
      "message": "mm: Remove slab destructors from kmem_cache_create().\n\nSlab destructors were no longer supported after Christoph\u0027s\nc59def9f222d44bb7e2f0a559f2906191a0862d7 change. They\u0027ve been\nBUGs for both slab and slub, and slob never supported them\neither.\n\nThis rips out support for the dtor pointer from kmem_cache_create()\ncompletely and fixes up every single callsite in the kernel (there were\nabout 224, not including the slab allocator definitions themselves,\nor the documentation references).\n\nSigned-off-by: Paul Mundt \u003clethal@linux-sh.org\u003e\n"
    },
    {
      "commit": "7dc12d6dd6cc1aa489c6f3e34a75e8023c945da8",
      "tree": "403ac929ddfb54e56893275d96741865e64d38ee",
      "parents": [
        "8238745a39606738c1d8d39f2052959b3e594b04"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jul 19 10:45:15 2007 +0900"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Jul 19 10:45:15 2007 +0900"
      },
      "message": "[NET] XFRM: Fix whitespace errors.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "bd0bf0765ea1fba80d7085e1f0375ec045631dc1",
      "tree": "7a637d217e6f090f3eebe127a11fcbfaabc1c3cd",
      "parents": [
        "16751347a060a10c09b11593bb179fd5b0240c04"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Jul 18 01:55:52 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jul 18 01:55:52 2007 -0700"
      },
      "message": "[XFRM]: Fix crash introduced by struct dst_entry reordering\n\nXFRM expects xfrm_dst-\u003eu.next to be same pointer as dst-\u003enext, which\nwas broken by the dst_entry reordering in commit 1e19e02c~, causing\nan oops in xfrm_bundle_ok when walking the bundle upwards.\n\nKill xfrm_dst-\u003eu.next and change the only user to use dst-\u003enext instead.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "628529b6ee334fedc8d25ce56205bb99566572b9",
      "tree": "4545df6f7ecdec05c903bb2c11ba9fb4380ac71c",
      "parents": [
        "007a531b0a0c902392a3deff730acd28ce6625c7"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Mon Jul 02 22:41:14 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Jul 10 22:16:35 2007 -0700"
      },
      "message": "[XFRM] Introduce standalone SAD lookup\n\nThis allows other in-kernel functions to do SAD lookups.\nThe only known user at the moment is pktgen.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "281216177a407f78cfd650ee4391afc487577193",
      "tree": "47325468a011757f3c4169e83d3172b744b5c9e5",
      "parents": [
        "fa490cfd15d7ce0900097cc4e60cfd7a76381138"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Jun 18 22:30:15 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jun 18 22:30:15 2007 -0700"
      },
      "message": "[XFRM]: Fix MTU calculation for non-ESP SAs\n\nMy IPsec MTU optimization patch introduced a regression in MTU calculation\nfor non-ESP SAs, the SA\u0027s header_len needs to be subtracted from the MTU if\nthe transform doesn\u0027t provide a -\u003eget_mtu() function.\n\nReported-and-tested-by: Marco Berizzi \u003cpupilla@hotmail.com\u003e\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4aa2e62c45b5ca08be2d0d3c0744d7585b56e860",
      "tree": "16649593d55f3df4dac54227fcda28bb4fb49f17",
      "parents": [
        "b00b4bf94edb42852d55619af453588b2de2dc5e"
      ],
      "author": {
        "name": "Joy Latten",
        "email": "latten@austin.ibm.com",
        "time": "Mon Jun 04 19:05:57 2007 -0400"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Jun 07 13:42:46 2007 -0700"
      },
      "message": "xfrm: Add security check before flushing SAD/SPD\n\nCurrently we check for permission before deleting entries from SAD and\nSPD, (see security_xfrm_policy_delete() security_xfrm_state_delete())\nHowever we are not checking for authorization when flushing the SPD and\nthe SAD completely. It was perhaps missed in the original security hooks\npatch.\n\nThis patch adds a security check when flushing entries from the SAD and\nSPD.  It runs the entire database and checks each entry for a denial.\nIf the process attempting the flush is unable to remove all of the\nentries a denial is logged the the flush function returns an error\nwithout removing anything.\n\nThis is particularly useful when a process may need to create or delete\nits own xfrm entries used for things like labeled networking but that\nsame process should not be able to delete other entries or flush the\nentire database.\n\nSigned-off-by: Joy Latten\u003clatten@austin.ibm.com\u003e\nSigned-off-by: Eric Paris \u003ceparis@parisplace.org\u003e\nSigned-off-by: James Morris \u003cjmorris@namei.org\u003e\n"
    },
    {
      "commit": "aad0e0b9b6e4f7085d5e2ec4b5bb59ffecd8b1fb",
      "tree": "923980b7bb6d9f06970ed21b961f547e33e2eb28",
      "parents": [
        "01e67d08faa782f1a4d38de702331f5904def6ad"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri May 25 00:42:49 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu May 31 01:23:24 2007 -0700"
      },
      "message": "[XFRM]: xfrm_larval_drop sysctl should be __read_mostly.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "01e67d08faa782f1a4d38de702331f5904def6ad",
      "tree": "72a546eaa73a9ef4967c1ba8232fead917d45a18",
      "parents": [
        "4738d2fa5986d3717055d8ee14b2aad87c30f1e7"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri May 25 00:41:38 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu May 31 01:23:23 2007 -0700"
      },
      "message": "[XFRM]: Allow XFRM_ACQ_EXPIRES to be tunable via sysctl.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "14e50e57aedb2a89cf79b77782879769794cab7b",
      "tree": "46cbdab9c8007cea0821294c9d397214b38ea4c8",
      "parents": [
        "04efb8787e4d8a7b21a61aeb723de33154311256"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu May 24 18:17:54 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu May 24 18:17:54 2007 -0700"
      },
      "message": "[XFRM]: Allow packet drops during larval state resolution.\n\nThe current IPSEC rule resolution behavior we have does not work for a\nlot of people, even though technically it\u0027s an improvement from the\n-EAGAIN buisness we had before.\n\nRight now we\u0027ll block until the key manager resolves the route.  That\nworks for simple cases, but many folks would rather packets get\nsilently dropped until the key manager resolves the IPSEC rules.\n\nWe can\u0027t tell these folks to \"set the socket non-blocking\" because\nthey don\u0027t have control over the non-block setting of things like the\nsockets used to resolve DNS deep inside of the resolver libraries in\nlibc.\n\nWith that in mind I coded up the patch below with some help from\nHerbert Xu which provides packet-drop behavior during larval state\nresolution, controllable via sysctl and off by default.\n\nThis lays the framework to either:\n\n1) Make this default at some point or...\n\n2) Move this logic into xfrm{4,6}_policy.c and implement the\n   ARP-like resolution queue we\u0027ve all been dreaming of.\n   The idea would be to queue packets to the policy, then\n   once the larval state is resolved by the key manager we\n   re-resolve the route and push the packets out.  The\n   packets would timeout if the rule didn\u0027t get resolved\n   in a certain amount of time.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "26b8e51e98ae09cfc770b918577c004a376de4b8",
      "tree": "1142962d8191c886da06f5b9711b4467cbf54b77",
      "parents": [
        "d25790532370e7448e3d3bd25a17e1e9f1299816"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue May 22 16:12:26 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 22 16:12:26 2007 -0700"
      },
      "message": "[IPSEC]: Fix warnings with casting int to pointer\n\nThis patch adds some casts to shut up the warnings introduced by my\nlast patch that added a common interator function for xfrm algorightms.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c92b3a2f1f11655ecf6774b745017a414241d07c",
      "tree": "822a53d289b6848992b9476eb6e451f32b8daa5e",
      "parents": [
        "580e572a4a1bfea2f42af63ba4785ac7dfbcb45d"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat May 19 14:21:18 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat May 19 14:21:18 2007 -0700"
      },
      "message": "[IPSEC] pfkey: Load specific algorithm in pfkey_add rather than all\n\nThis is a natural extension of the changeset\n\n    [XFRM]: Probe selected algorithm only.\n\nwhich only removed the probe call for xfrm_user.  This patch does exactly\nthe same thing for af_key.  In other words, we load the algorithm requested\nby the user rather than everything when adding xfrm states in af_key.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6253db055eb62a1bd0a18a1d8489565303b2b1dd",
      "tree": "06440f71cda30cd10523424dc9855ac6076d9f1c",
      "parents": [
        "b5505c6e1071b32176c7548a3aaf0be49f7c763e"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon May 14 02:19:11 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon May 14 02:19:11 2007 -0700"
      },
      "message": "[IPSEC]: Don\u0027t warn if high-order hash resize fails\n\nMulti-page allocations are always likely to fail.  Since such failures\nare expected and non-critical in xfrm_hash_alloc, we shouldn\u0027t warn about\nthem.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b5505c6e1071b32176c7548a3aaf0be49f7c763e",
      "tree": "3c534e5b0381422356053511e01b40ac461508a5",
      "parents": [
        "705962ccc9d21a08b74b6b6e1d3cf10f98968a67"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon May 14 02:15:47 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon May 14 02:15:47 2007 -0700"
      },
      "message": "[IPSEC]: Check validity of direction in xfrm_policy_byid\n\nThe function xfrm_policy_byid takes a dir argument but finds the policy\nusing the index instead.  We only use the dir argument to update the\npolicy count for that direction.  Since the user can supply any value\nfor dir, this can corrupt our policy count.\n\nI know this is the problem because a few days ago I was deleting\npolicies by hand using indicies and accidentally typed in the wrong\ndirection.  It still deleted the policy and at the time I thought\nthat was cool.  In retrospect it isn\u0027t such a good idea :)\n\nI decided against letting it delete the policy anyway just in case\nwe ever remove the connection between indicies and direction.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5a6d34162f5c6f522f857df274f1c8240f161e11",
      "tree": "537d305eef465617944821a1df59da3523a640df",
      "parents": [
        "af11e31609d93765c1b22611592543e028f7aa54"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Fri May 04 12:55:39 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri May 04 12:55:39 2007 -0700"
      },
      "message": "[XFRM] SPD info TLV aggregation\n\nAggregate the SPD info TLVs.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "af11e31609d93765c1b22611592543e028f7aa54",
      "tree": "f8a915dc7d98844667308f7c234d00f59113ff3f",
      "parents": [
        "224711df5c00f7540b89f32a8225866031977f17"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Fri May 04 12:55:13 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri May 04 12:55:13 2007 -0700"
      },
      "message": "[XFRM] SAD info TLV aggregationx\n\nAggregate the SAD info TLVs.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "157bfc25020f7eb731f94140e099307ade47299e",
      "tree": "422821e5233daf0d8347ac361f09be9f49b43de4",
      "parents": [
        "34588b4c046c34773e5a1a962da7b78b05c4d1bd"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Mon Apr 30 00:33:35 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Apr 30 00:58:09 2007 -0700"
      },
      "message": "[XFRM]: Restrict upper layer information by bundle.\n\nOn MIPv6 usage, XFRM sub policy is enabled.\nWhen main (IPsec) and sub (MIPv6) policy selectors have the same\naddress set but different upper layer information (i.e. protocol\nnumber and its ports or type/code), multiple bundle should be created.\nHowever, currently we have issue to use the same bundle created for\nthe first time with all flows covered by the case.\n\nIt is useful for the bundle to have the upper layer information\nto be restructured correctly if it does not match with the flow.\n\n1. Bundle was created by two policies\nSelector from another policy is added to xfrm_dst.\nIf the flow does not match the selector, it goes to slow path to\nrestructure new bundle by single policy.\n\n2. Bundle was created by one policy\nFlow cache is added to xfrm_dst as originated one. If the flow does\nnot match the cache, it goes to slow path to try searching another\npolicy.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ecfd6b183780c6d9e85873693b3ce6c5f4d08b58",
      "tree": "8ee1330176e3011d3fdf86e70b5933b50302b7e7",
      "parents": [
        "5632c5152aa621885d87ea0b8fdd5a6bb9f69c6f"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Sat Apr 28 21:20:32 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Apr 28 21:20:32 2007 -0700"
      },
      "message": "[XFRM]: Export SPD info\n\nWith this patch you can use iproute2 in user space to efficiently see\nhow many policies exist in different directions.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1a028e50729b85d0a038fad13daf0ee201a37454",
      "tree": "a4ffbf7c5476203e1db51b4bd9d076c69d772697",
      "parents": [
        "50f732ee63b91eb08a29974b36bd63e1150bb642"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Apr 27 15:21:23 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Apr 27 15:21:23 2007 -0700"
      },
      "message": "[NET]: Revert sk_buff walker cleanups.\n\nThis reverts eefa3906283a2b60a6d02a2cda593a7d7d7946c5\n\nThe simplification made in that change works with the assumption that\nthe \u0027offset\u0027 parameter to these functions is always positive or zero,\nwhich is not true.  It can be and often is negative in order to access\nSKB header values in front of skb-\u003edata.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "566ec03448052c096dc3982fbe573522dc0ba479",
      "tree": "fef4015f92e4e50f98e1a1630333cc59ed4ec523",
      "parents": [
        "bfbf3c0968498f5232c02965cf41695edae1bc4d"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Thu Apr 26 14:12:15 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 26 14:12:15 2007 -0700"
      },
      "message": "[XFRM]: Missing bits to SAD info.\n\nThis brings the SAD info in sync with net-2.6.22/net-2.6\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "eefa3906283a2b60a6d02a2cda593a7d7d7946c5",
      "tree": "a4e1f3b8dca04b8dff3cd99dc43f771f798558fb",
      "parents": [
        "28d8909bc790d936ce33f4402adf7577533bbd4b"
      ],
      "author": {
        "name": "Jean Delvare",
        "email": "jdelvare@suse.de",
        "time": "Thu Apr 26 00:44:22 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 26 00:44:22 2007 -0700"
      },
      "message": "[NET]: Clean up sk_buff walkers.\n\nI noticed recently that, in skb_checksum(), \"offset\" and \"start\" are\nessentially the same thing and have the same value throughout the\nfunction, despite being computed differently. Using a single variable\nallows some cleanups and makes the skb_checksum() function smaller,\nmore readable, and presumably marginally faster.\n\nWe appear to have many other \"sk_buff walker\" functions built on the\nexact same model, so the cleanup applies to them, too. Here is a list\nof the functions I found to be affected:\n\nnet/appletalk/ddp.c:atalk_sum_skb()\nnet/core/datagram.c:skb_copy_datagram_iovec()\nnet/core/datagram.c:skb_copy_and_csum_datagram()\nnet/core/skbuff.c:skb_copy_bits()\nnet/core/skbuff.c:skb_store_bits()\nnet/core/skbuff.c:skb_checksum()\nnet/core/skbuff.c:skb_copy_and_csum_bit()\nnet/core/user_dma.c:dma_skb_copy_datagram_iovec()\nnet/xfrm/xfrm_algo.c:skb_icv_walk()\nnet/xfrm/xfrm_algo.c:skb_to_sgvec()\n\nOTOH, I admit I\u0027m a bit surprised, the cleanup is rather obvious so I\u0027m\nreally wondering if I am missing something. Can anyone please comment\non this?\n\nSigned-off-by: Jean Delvare \u003cjdelvare@suse.de\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "28d8909bc790d936ce33f4402adf7577533bbd4b",
      "tree": "8de479d6660aba23bc99fa555c150852548df58d",
      "parents": [
        "98486fa2f4894e2b01e325c659635596bdec1614"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Thu Apr 26 00:10:29 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 26 00:10:29 2007 -0700"
      },
      "message": "[XFRM]: Export SAD info.\n\nOn a system with a lot of SAs, counting SAD entries chews useful\nCPU time since you need to dump the whole SAD to user space;\ni.e something like ip xfrm state ls | grep -i src | wc -l\nI have seen taking literally minutes on a 40K SAs when the system\nis swapping.\nWith this patch, some of the SAD info (that was already being tracked)\nis exposed to user space. i.e you do:\nip xfrm state count\nAnd you get the count; you can also pass -s to the command line and\nget the hash info.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3ff50b7997fe06cd5d276b229967bb52d6b3b6c1",
      "tree": "4f0f57123a945c3e6c39759456b6187bb78c4b1f",
      "parents": [
        "c462238d6a6d8ee855bda10f9fff442971540ed2"
      ],
      "author": {
        "name": "Stephen Hemminger",
        "email": "shemminger@linux-foundation.org",
        "time": "Fri Apr 20 17:09:22 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Apr 25 22:29:24 2007 -0700"
      },
      "message": "[NET]: cleanup extra semicolons\n\nSpring cleaning time...\n\nThere seems to be a lot of places in the network code that have\nextra bogus semicolons after conditionals.  Most commonly is a\nbogus semicolon after: switch() { }\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@linux-foundation.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "af65bdfce98d7965fbe93a48b8128444a2eea024",
      "tree": "e6ac5ff82a0d5067213135cdf049b912b02e824d",
      "parents": [
        "b076deb8498e26c9aa2f44046fe5e9936ae2fb5a"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Fri Apr 20 14:14:21 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Apr 25 22:29:03 2007 -0700"
      },
      "message": "[NETLINK]: Switch cb_lock spinlock to mutex and allow to override it\n\nSwitch cb_lock to mutex and allow netlink kernel users to override it\nwith a subsystem specific mutex for consistent locking in dump callbacks.\nAll netlink_dump_start users have been audited not to rely on any\nside-effects of the previously used spinlock.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c5c2523893747f88a83376abad310c8ad13f7197",
      "tree": "58f1ab25ac9f7ca7460abbd24e9bab9c8683f6fd",
      "parents": [
        "557922584d9c5b6b990bcfb2fec3134f0e73a05d"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Apr 09 11:47:18 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Apr 25 22:28:38 2007 -0700"
      },
      "message": "[XFRM]: Optimize MTU calculation\n\nReplace the probing based MTU estimation, which usually takes 2-3 iterations\nto find a fitting value and may underestimate the MTU, by an exact calculation.\n\nAlso fix underestimation of the XFRM trailer_len, which causes unnecessary\nreallocations.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "716ea3a7aae3a2bfc44cb97b5419c1c9868c7bc9",
      "tree": "d599c7ff113e815c2052e40ec71bdab3761a45fc",
      "parents": [
        "926554c4b74e53d5da4cefdc3bbd7e92427fb1a9"
      ],
      "author": {
        "name": "David Howells",
        "email": "dhowells@redhat.com",
        "time": "Mon Apr 02 20:19:53 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Apr 25 22:28:33 2007 -0700"
      },
      "message": "[NET]: Move generic skbuff stuff from XFRM code to generic code\n\nMove generic skbuff stuff from XFRM code to generic code so that\nAF_RXRPC can use it too.\n\nThe kdoc comments I\u0027ve attached to the functions needs to be checked\nby whoever wrote them as I had to make some guesses about the workings\nof these functions.\n\nSigned-off-By: David Howells \u003cdhowells@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c702e8047fe74648f7852a9c1de781b0d5a98402",
      "tree": "24bd031d79f3d1159bc08704a51c84de01d712b0",
      "parents": [
        "ead592ba246dfcc643b3f0f0c8c03f7bc898a59f"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Thu Mar 22 23:30:55 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Apr 25 22:27:33 2007 -0700"
      },
      "message": "[NETLINK]: Directly return -EINTR from netlink_dump_start()\n\nNow that all users of netlink_dump_start() use netlink_run_queue()\nto process the receive queue, it is possible to return -EINTR from\nnetlink_dump_start() directly, therefore simplying the callers.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1d00a4eb42bdade33a6ec0961cada93577a66ae6",
      "tree": "a181b141818f594eb544601386bf09e45e6193bb",
      "parents": [
        "45e7ae7f716086994e4e747226881f901c67b031"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Thu Mar 22 23:30:12 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Apr 25 22:27:30 2007 -0700"
      },
      "message": "[NETLINK]: Remove error pointer from netlink message handler\n\nThe error pointer argument in netlink message handlers is used\nto signal the special case where processing has to be interrupted\nbecause a dump was started but no error happened. Instead it is\nsimpler and more clear to return -EINTR and have netlink_run_queue()\ndeal with getting the queue right.\n\nnfnetlink passed on this error pointer to its subsystem handlers\nbut only uses it to signal the start of a netlink dump. Therefore\nit can be removed there as well.\n\nThis patch also cleans up the error handling in the affected\nmessage handlers to be consistent since it had to be touched anyway.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "45e7ae7f716086994e4e747226881f901c67b031",
      "tree": "8f61cb9e3f67ac433e915176c2bf233d8899691d",
      "parents": [
        "d35b685640aeb39eb4f5e98c75e8e001e406f9a3"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Thu Mar 22 23:29:10 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Apr 25 22:27:29 2007 -0700"
      },
      "message": "[NETLINK]: Ignore control messages directly in netlink_run_queue()\n\nChanges netlink_rcv_skb() to skip netlink controll messages and don\u0027t\npass them on to the message handler.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d35b685640aeb39eb4f5e98c75e8e001e406f9a3",
      "tree": "c3ec38a2fb54a3783dd9c764bf58be68557f9396",
      "parents": [
        "33a0543cd9e090d2c6759e0ed85c3049c6efcc06"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Thu Mar 22 23:28:46 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Apr 25 22:27:29 2007 -0700"
      },
      "message": "[NETLINK]: Ignore !NLM_F_REQUEST messages directly in netlink_run_queue()\n\nnetlink_rcv_skb() is changed to skip messages which don\u0027t have the\nNLM_F_REQUEST bit to avoid every netlink family having to perform this\ncheck on their own.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "dc5fc579b90ed0a9a4e55b0218cdbaf0a8cf2e67",
      "tree": "673dbb425c2b09b4256ef71f89dfc5cc01944386",
      "parents": [
        "a36ca733375860b389c15ffdf6a5f92df64a33b6"
      ],
      "author": {
        "name": "Arnaldo Carvalho de Melo",
        "email": "acme@redhat.com",
        "time": "Sun Mar 25 23:06:12 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Apr 25 22:26:37 2007 -0700"
      },
      "message": "[NETLINK]: Use nlmsg_trim() where appropriate\n\nSigned-off-by: Arnaldo Carvalho de Melo \u003cacme@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "27a884dc3cb63b93c2b3b643f5b31eed5f8a4d26",
      "tree": "5a267e40f9b94014be38dad5de0a52b6628834e0",
      "parents": [
        "be8bd86321fa7f06359d866ef61fb4d2f3e9dce9"
      ],
      "author": {
        "name": "Arnaldo Carvalho de Melo",
        "email": "acme@redhat.com",
        "time": "Thu Apr 19 20:29:13 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Apr 25 22:26:28 2007 -0700"
      },
      "message": "[SK_BUFF]: Convert skb-\u003etail to sk_buff_data_t\n\nSo that it is also an offset from skb-\u003ehead, reduces its size from 8 to 4 bytes\non 64bit architectures, allowing us to combine the 4 bytes hole left by the\nlayer headers conversion, reducing struct sk_buff size to 256 bytes, i.e. 4\n64byte cachelines, and since the sk_buff slab cache is SLAB_HWCACHE_ALIGN...\n:-)\n\nMany calculations that previously required that skb-\u003e{transport,network,\nmac}_header be first converted to a pointer now can be done directly, being\nmeaningful as offsets or pointers.\n\nSigned-off-by: Arnaldo Carvalho de Melo \u003cacme@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9c70220b73908f64792422a2c39c593c4792f2c5",
      "tree": "2090ea10aaa2714a5e095bae8cc02e743c378a3a",
      "parents": [
        "a27ef749e7be3b06fb58df53d94eb97a21f18707"
      ],
      "author": {
        "name": "Arnaldo Carvalho de Melo",
        "email": "acme@redhat.com",
        "time": "Wed Apr 25 18:04:18 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Apr 25 22:25:31 2007 -0700"
      },
      "message": "[SK_BUFF]: Introduce skb_transport_header(skb)\n\nFor the places where we need a pointer to the transport header, it is\nstill legal to touch skb-\u003eh.raw directly if just adding to,\nsubtracting from or setting it to another layer header.\n\nSigned-off-by: Arnaldo Carvalho de Melo \u003cacme@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9d729f72dca9406025bcfa9c1f660d71d9ef0ff5",
      "tree": "69a3ca50c6e266853676a545a113f13f254ae535",
      "parents": [
        "39df232f1a9ba48d41c68ee7d4046756e709cf91"
      ],
      "author": {
        "name": "James Morris",
        "email": "jmorris@namei.org",
        "time": "Sun Mar 04 16:12:44 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Apr 25 22:23:32 2007 -0700"
      },
      "message": "[NET]: Convert xtime.tv_sec to get_seconds()\n\nWhere appropriate, convert references to xtime.tv_sec to the\nget_seconds() helper function.\n\nSigned-off-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "661697f728d75302e1f661a58db2fcba71d5cbc9",
      "tree": "07513117f8bfc5ca1844c768a6edb410c1a0c5bf",
      "parents": [
        "279e172a580d415b83eba4f9fbbc77b08e546553"
      ],
      "author": {
        "name": "Joy Latten",
        "email": "latten@austin.ibm.com",
        "time": "Fri Apr 13 16:14:35 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Apr 13 16:14:35 2007 -0700"
      },
      "message": "[IPSEC] XFRM_USER: kernel panic when large security contexts in ACQUIRE\n\nWhen sending a security context of 50+ characters in an ACQUIRE \nmessage, following kernel panic occurred.\n\nkernel BUG in xfrm_send_acquire at net/xfrm/xfrm_user.c:1781!\ncpu 0x3: Vector: 700 (Program Check) at [c0000000421bb2e0]\n    pc: c00000000033b074: .xfrm_send_acquire+0x240/0x2c8\n    lr: c00000000033b014: .xfrm_send_acquire+0x1e0/0x2c8\n    sp: c0000000421bb560\n   msr: 8000000000029032\n  current \u003d 0xc00000000fce8f00\n  paca    \u003d 0xc000000000464b00\n    pid   \u003d 2303, comm \u003d ping\nkernel BUG in xfrm_send_acquire at net/xfrm/xfrm_user.c:1781!\nenter ? for help\n3:mon\u003e t\n[c0000000421bb650] c00000000033538c .km_query+0x6c/0xec\n[c0000000421bb6f0] c000000000337374 .xfrm_state_find+0x7f4/0xb88\n[c0000000421bb7f0] c000000000332350 .xfrm_tmpl_resolve+0xc4/0x21c\n[c0000000421bb8d0] c0000000003326e8 .xfrm_lookup+0x1a0/0x5b0\n[c0000000421bba00] c0000000002e6ea0 .ip_route_output_flow+0x88/0xb4\n[c0000000421bbaa0] c0000000003106d8 .ip4_datagram_connect+0x218/0x374\n[c0000000421bbbd0] c00000000031bc00 .inet_dgram_connect+0xac/0xd4\n[c0000000421bbc60] c0000000002b11ac .sys_connect+0xd8/0x120\n[c0000000421bbd90] c0000000002d38d0 .compat_sys_socketcall+0xdc/0x214\n[c0000000421bbe30] c00000000000869c syscall_exit+0x0/0x40\n--- Exception: c00 (System Call) at 0000000007f0ca9c\nSP (fc0ef8f0) is in userspace\n\nWe are using size of security context from xfrm_policy to determine\nhow much space to alloc skb and then putting security context from\nxfrm_state into skb. Should have been using size of security context \nfrom xfrm_state to alloc skb. Following fix does that\n\nSigned-off-by: Joy Latten \u003clatten@austin.ibm.com\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4c4d51a7316b164ba08af61aa0c124a88bc60450",
      "tree": "432e2d46513ddb61b0da9da14410b6888c947b70",
      "parents": [
        "60e5c166413f17d5ef00b4c1f398dbd44291309a"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Apr 05 00:07:39 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 05 00:07:39 2007 -0700"
      },
      "message": "[IPSEC]: Reject packets within replay window but outside the bit mask\n\nUp until this point we\u0027ve accepted replay window settings greater than\n32 but our bit mask can only accomodate 32 packets.  Thus any packet\nwith a sequence number within the window but outside the bit mask would\nbe accepted.\n\nThis patch causes those packets to be rejected instead.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b6f99a211957910a07437f46ce54dcfb1755cf84",
      "tree": "0ae2ffc1982d445318363fb94d656b9a483c0c7a",
      "parents": [
        "289f42492c0958871b6045050474c752ec99704f"
      ],
      "author": {
        "name": "Dave Jones",
        "email": "davej@redhat.com",
        "time": "Thu Mar 22 12:27:49 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 22 12:27:49 2007 -0700"
      },
      "message": "[NET]: fix up misplaced inlines.\n\nTurning up the warnings on gcc makes it emit warnings\nabout the placement of \u0027inline\u0027 in function declarations.\nHere\u0027s everything that was under net/\n\nSigned-off-by: Dave Jones \u003cdavej@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "961995582e3752e983dc3906a57546a188007440",
      "tree": "af315f93ea010e43e7925641a8d0c92f84f6c8f1",
      "parents": [
        "e4ce837de96d58509f5f815ab37a46889788e701"
      ],
      "author": {
        "name": "Joy Latten",
        "email": "latten@austin.ibm.com",
        "time": "Mon Mar 19 18:47:26 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Mar 20 00:09:47 2007 -0700"
      },
      "message": "[XFRM]: ipsecv6 needs a space when printing audit record.\n\nThis patch adds a space between printing of the src and dst ipv6 addresses.\nOtherwise, audit or other test tools may fail to process the audit\nrecord properly because they cannot find the dst address.\n\nSigned-off-by: Joy Latten \u003clatten@austin.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "75e252d981c0e80c14ce90df246e9b1300474c4f",
      "tree": "668f2df92fb85e17574a1fbdf34062539eff69d7",
      "parents": [
        "ce0ecd594d78710422599918a608e96dd1ee6024"
      ],
      "author": {
        "name": "Joy Latten",
        "email": "latten@austin.ibm.com",
        "time": "Mon Mar 12 17:14:07 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 12 17:14:07 2007 -0700"
      },
      "message": "[XFRM]: Fix missing protocol comparison of larval SAs.\n\nI noticed that in xfrm_state_add we look for the larval SA in a few\nplaces without checking for protocol match. So when using both \nAH and ESP, whichever one gets added first, deletes the larval SA. \nIt seems AH always gets added first and ESP is always the larval \nSA\u0027s protocol since the xfrm-\u003etmpl has it first. Thus causing the\nadditional km_query()\n\nAdding the check eliminates accidental double SA creation. \n\nSigned-off-by: Joy Latten \u003clatten@austin.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "16bec31db751030171b31d7767fa3a5bdbe980ea",
      "tree": "60b69d571ba42ef0bf9f54833bd10228220c87bd",
      "parents": [
        "215a2dd3b43e0dc425e81d21de9d961416b1dad4"
      ],
      "author": {
        "name": "Eric Paris",
        "email": "eparis@redhat.com",
        "time": "Wed Mar 07 16:02:16 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Mar 07 16:08:11 2007 -0800"
      },
      "message": "[IPSEC]: xfrm audit hook misplaced in pfkey_delete and xfrm_del_sa\n\nInside pfkey_delete and xfrm_del_sa the audit hooks were not called if\nthere was any permission/security failures in attempting to do the del\noperation (such as permission denied from security_xfrm_state_delete).\nThis patch moves the audit hook to the exit path such that all failures\n(and successes) will actually get audited.\n\nSigned-off-by: Eric Paris \u003ceparis@redhat.com\u003e\nAcked-by: Venkat Yekkirala \u003cvyekkirala@trustedcs.com\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ef41aaa0b755f479012341ac11db9ca5b8928d98",
      "tree": "f5cd83b9117d0092f40006fbf4fd1f39652ad925",
      "parents": [
        "05e52dd7396514648fba6c275eb7b49eca333c6d"
      ],
      "author": {
        "name": "Eric Paris",
        "email": "eparis@redhat.com",
        "time": "Wed Mar 07 15:37:58 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Mar 07 16:08:09 2007 -0800"
      },
      "message": "[IPSEC]: xfrm_policy delete security check misplaced\n\nThe security hooks to check permissions to remove an xfrm_policy were\nactually done after the policy was removed.  Since the unlinking and\ndeletion are done in xfrm_policy_by* functions this moves the hooks\ninside those 2 functions.  There we have all the information needed to\ndo the security check and it can be done before the deletion.  Since\nauditing requires the result of that security check err has to be passed\nback and forth from the xfrm_policy_by* functions.\n\nThis patch also fixes a bug where a deletion that failed the security\ncheck could cause improper accounting on the xfrm_policy\n(xfrm_get_policy didn\u0027t have a put on the exit path for the hold taken\nby xfrm_policy_by*)\n\nIt also fixes the return code when no policy is found in\nxfrm_add_pol_expire.  In old code (at least back in the 2.6.18 days) err\nwasn\u0027t used before the return when no policy is found and so the\ninitialization would cause err to be ENOENT.  But since err has since\nbeen used above when we don\u0027t get a policy back from the xfrm_policy_by*\nfunction we would always return 0 instead of the intended ENOENT.  Also\nfixed some white space damage in the same area.\n\nSigned-off-by: Eric Paris \u003ceparis@redhat.com\u003e\nAcked-by: Venkat Yekkirala \u003cvyekkirala@trustedcs.com\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b08d5840d2c5a6ac0bce172f4c861974d718e34b",
      "tree": "8f9423bc255d312269065623fcb136fc661b8bc1",
      "parents": [
        "4498121ca3acbf928681b71261227d28dc29b6f6"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue Feb 27 09:57:37 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Feb 28 09:42:14 2007 -0800"
      },
      "message": "[NET]: Fix kfree(skb)\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nAcked-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3a765aa528401c7aec2208f7ed1276b232b24c57",
      "tree": "68aaefaf32b0869bc2a11d713395c41b2e59d409",
      "parents": [
        "2ff7354fe888f46f6629b57e463b0a1eb956c02b"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Feb 26 14:52:21 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Feb 28 09:41:57 2007 -0800"
      },
      "message": "[XFRM] xfrm_user: Fix return values of xfrm_add_sa_expire.\n\nAs noted by Kent Yoder, this function will always return an\nerror.  Make sure it returns zero on success.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "928ba4169dc1d82c83105831f5ddb5472379b440",
      "tree": "0c10cafc4b09306604e192a52a23e212e6ad50de",
      "parents": [
        "73d605d1abbd70ef67b7660cf2ff177259960756"
      ],
      "author": {
        "name": "Kazunori MIYAZAWA",
        "email": "miyazawa@linux-ipv6.org",
        "time": "Tue Feb 13 12:57:16 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 13 12:57:16 2007 -0800"
      },
      "message": "[IPSEC]: Fix the address family to refer encap_family\n\nFix the address family to refer encap_family\nwhen comparing with a kernel generated xfrm_state\n\nSigned-off-by: Kazunori MIYAZAWA \u003cmiyazawa@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "13fcfbb0675bf87da694f55dec11cada489a205c",
      "tree": "2a1b81c5f7e69781f3e6ee523fd67c2b923531ca",
      "parents": [
        "9121c77706a4bd75a878573c913553ade120e9ce"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Feb 12 13:53:54 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Feb 12 13:53:54 2007 -0800"
      },
      "message": "[XFRM]: Fix OOPSes in xfrm_audit_log().\n\nMake sure that this function is called correctly, and\nadd BUG() checking to ensure the arguments are sane.\n\nBased upon a patch by Joy Latten.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a716c1197d608c55adfba45692a890ca64e10df0",
      "tree": "07750556a958649d44776b877be0e41f8dfd33d1",
      "parents": [
        "f8e1d20183bf56f889d60edadd48f54912b9277f"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Fri Feb 09 23:25:29 2007 +0900"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Feb 10 23:20:24 2007 -0800"
      },
      "message": "[NET] XFRM: Fix whitespace errors.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9783e1df7a6bd1e4dc5e2cafcdc29b65a47473d6",
      "tree": "9216a285bfe23aa799ca6efa01a3f4063d798e64",
      "parents": [
        "4387ff75f29412a234d394b0276c2b239d3d3844",
        "dc2e2f33bbf07344995357314fd8887f6564dba7"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Feb 08 15:25:18 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Feb 08 15:25:18 2007 -0800"
      },
      "message": "Merge branch \u0027HEAD\u0027 of master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6\n\nConflicts:\n\n\tcrypto/Kconfig\n"
    },
    {
      "commit": "e610e679dd0057403c96cd31f8739792780732ee",
      "tree": "56f90c947dcd04c5a8a637930a3e685a34a8d99d",
      "parents": [
        "f6ed0ec0eea644207fa146cb541b99f96a8942f0"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Feb 08 13:29:15 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Feb 08 13:29:15 2007 -0800"
      },
      "message": "[XFRM]: xfrm_migrate() needs exporting to modules.\n\nNeeded by xfrm_user and af_key.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f6ed0ec0eea644207fa146cb541b99f96a8942f0",
      "tree": "86c47aa14c931948cac52a3a0ae10960e57ff680",
      "parents": [
        "08de61beab8a21c8e0b3906a97defda5f1f66ece"
      ],
      "author": {
        "name": "Shinta Sugimoto",
        "email": "shinta.sugimoto@ericsson.com",
        "time": "Thu Feb 08 13:15:05 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 08 13:15:05 2007 -0800"
      },
      "message": "[PFKEYV2]: CONFIG_NET_KEY_MIGRATE option\n\nAdd CONFIG_NET_KEY_MIGRATE option which makes it possible for user\napplication to send or receive MIGRATE message to/from PF_KEY socket.\n\nSigned-off-by: Shinta Sugimoto \u003cshinta.sugimoto@ericsson.com\u003e\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d0473655c8293b49808c9488152573beab4458cf",
      "tree": "1d461e051061780604a270608eaf16c3d995655a",
      "parents": [
        "5c79de6e79cd8ecfbae28886be3ee49044f3a4d4"
      ],
      "author": {
        "name": "Shinta Sugimoto",
        "email": "shinta.sugimoto@ericsson.com",
        "time": "Thu Feb 08 13:13:07 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 08 13:13:07 2007 -0800"
      },
      "message": "[XFRM]: CONFIG_XFRM_MIGRATE option\n\nAdd CONFIG_XFRM_MIGRATE option which makes it possible for for user\napplication to send or receive MIGRATE message to/from netlink socket.\n\nSigned-off-by: Shinta Sugimoto \u003cshinta.sugimoto@ericsson.com\u003e\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5c79de6e79cd8ecfbae28886be3ee49044f3a4d4",
      "tree": "74b085599f3d7d364931686081e4e1a1776c8430",
      "parents": [
        "80c9abaabf4283f7cf4a0b3597cd302506635b7f"
      ],
      "author": {
        "name": "Shinta Sugimoto",
        "email": "shinta.sugimoto@ericsson.com",
        "time": "Thu Feb 08 13:12:32 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 08 13:12:32 2007 -0800"
      },
      "message": "[XFRM]: User interface for handling XFRM_MSG_MIGRATE\n\nAdd user interface for handling XFRM_MSG_MIGRATE. The message is issued\nby user application. When kernel receives the message, procedure of\nupdating XFRM databases will take place.\n\nSigned-off-by: Shinta Sugimoto \u003cshinta.sugimoto@ericsson.com\u003e\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "80c9abaabf4283f7cf4a0b3597cd302506635b7f",
      "tree": "7dd4270a22e039c827114d182c2071a84826f563",
      "parents": [
        "9934e81c8c4981342dab3e386aff5d4499bea0d2"
      ],
      "author": {
        "name": "Shinta Sugimoto",
        "email": "shinta.sugimoto@ericsson.com",
        "time": "Thu Feb 08 13:11:42 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 08 13:11:42 2007 -0800"
      },
      "message": "[XFRM]: Extension for dynamic update of endpoint address(es)\n\nExtend the XFRM framework so that endpoint address(es) in the XFRM\ndatabases could be dynamically updated according to a request (MIGRATE\nmessage) from user application. Target XFRM policy is first identified\nby the selector in the MIGRATE message. Next, the endpoint addresses\nof the matching templates and XFRM states are updated according to\nthe MIGRATE message.\n\nSigned-off-by: Shinta Sugimoto \u003cshinta.sugimoto@ericsson.com\u003e\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cdca72652adf597f7fef821a27595fd0dd5eea19",
      "tree": "4a11752d72f70b2248aa811c165cc95007d21a8f",
      "parents": [
        "243cb4e56061c3f4cb76312c5527840344d57c3b"
      ],
      "author": {
        "name": "Miika Komu",
        "email": "miika@iki.fi",
        "time": "Tue Feb 06 14:24:56 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Feb 08 12:39:00 2007 -0800"
      },
      "message": "[IPSEC]: exporting xfrm_state_afinfo\n\nThis patch exports xfrm_state_afinfo.\n\nSigned-off-by: Miika Komu \u003cmiika@iki.fi\u003e\nSigned-off-by: Diego Beltrami \u003cDiego.Beltrami@hiit.fi\u003e\nSigned-off-by: Kazunori Miyazawa \u003cmiyazawa@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6a0dc8d733de4aca958a73019877f96b4754d671",
      "tree": "b9316278827c77cdca13a34aa50040c769a164c9",
      "parents": [
        "390fbd1bfaa7b561af8e4f385067c55bdf4100ba"
      ],
      "author": {
        "name": "Noriaki TAKAMIYA",
        "email": "takamiya@po.ntts.co.jp",
        "time": "Sun Oct 22 15:05:57 2006 +1000"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Feb 07 09:21:05 2007 +1100"
      },
      "message": "[IPSEC]: added the entry of Camellia cipher algorithm to ealg_list[]\n\nThis patch adds the entry of Camellia cipher algorithm to ealg_list[].\n\nSigned-off-by: Noriaki TAKAMIYA \u003ctakamiya@po.ntts.co.jp\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "a6c7ab55dda3e16ab5a3cf6f39585aee5876ac3a",
      "tree": "2ad7ed20bcf18bf1ff8b9354ec0a8f498627c1eb",
      "parents": [
        "8f1adb5f27d352c776ac34648cc277d1f8199dba"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Jan 16 16:52:02 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Jan 23 20:25:51 2007 -0800"
      },
      "message": "[IPSEC]: Policy list disorder\n\nThe recent hashing introduced an off-by-one bug in policy list insertion.\nInstead of adding after the last entry with a lesser or equal priority,\nwe\u0027re adding after the successor of that entry.\n\nThis patch fixes this and also adds a warning if we detect a duplicate\nentry in the policy list.  This should never happen due to this if clause.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "22e700502380b80cc81a44e219282762429ebe71",
      "tree": "4dc11c0e5a52ee5d0f3b73ce5ff8c50e1696e46c",
      "parents": [
        "9c2440bbe82892c8e3cd541632ac71bd765757a3"
      ],
      "author": {
        "name": "Christoph Hellwig",
        "email": "hch@lst.de",
        "time": "Tue Jan 02 15:22:30 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Jan 03 18:38:13 2007 -0800"
      },
      "message": "[XFRM_USER]: avoid pointless void ** casts\n\nAll -\u003edoit handlers want a struct rtattr **, so pass down the right\ntype.\n\nSigned-off-by: Christoph Hellwig \u003chch@lst.de\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b836267aa79c1c5e23e00d9cec047b6870ae0db1",
      "tree": "c66b785335c0ed1eb116c743aa5d3910e63ebe0a",
      "parents": [
        "cb4db4c22182163f66325053331a4e7096f663cd"
      ],
      "author": {
        "name": "Martin Willi",
        "email": "martin@strongswan.org",
        "time": "Thu Dec 28 21:27:48 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sun Dec 31 14:06:51 2006 -0800"
      },
      "message": "[XFRM]: Algorithm lookup using .compat name\n\nInstalling an IPsec SA using old algorithm names (.compat) does not work\nif the algorithm is not already loaded. When not using the PF_KEY\ninterface, algorithms are not preloaded in xfrm_probe_algs() and\ninstalling a IPsec SA fails.\n\nSigned-off-by: Martin Willi \u003cmartin@strongswan.org\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2685b267bce34c9b66626cb11664509c32a761a5",
      "tree": "ce8b4ad47b4a1aa1b0e7634298d63c4cb0ca46c5",
      "parents": [
        "4522d58275f124105819723e24e912c8e5bf3cdd",
        "272491ef423b6976a230a998b10f46976aa91342"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@woody.osdl.org",
        "time": "Thu Dec 07 09:05:15 2006 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@woody.osdl.org",
        "time": "Thu Dec 07 09:05:15 2006 -0800"
      },
      "message": "Merge master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6\n\n* master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6: (48 commits)\n  [NETFILTER]: Fix non-ANSI func. decl.\n  [TG3]: Identify Serdes devices more clearly.\n  [TG3]: Use msleep.\n  [TG3]: Use netif_msg_*.\n  [TG3]: Allow partial speed advertisement.\n  [TG3]: Add TG3_FLG2_IS_NIC flag.\n  [TG3]: Add 5787F device ID.\n  [TG3]: Fix Phy loopback.\n  [WANROUTER]: Kill kmalloc debugging code.\n  [TCP] inet_twdr_hangman: Delete unnecessary memory barrier().\n  [NET]: Memory barrier cleanups\n  [IPSEC]: Fix inetpeer leak in ipv4 xfrm dst entries.\n  audit: disable ipsec auditing when CONFIG_AUDITSYSCALL\u003dn\n  audit: Add auditing to ipsec\n  [IRDA] irlan: Fix compile warning when CONFIG_PROC_FS\u003dn\n  [IrDA]: Incorrect TTP header reservation\n  [IrDA]: PXA FIR code device model conversion\n  [GENETLINK]: Fix misplaced command flags.\n  [NETLIK]: Add a pointer to the Generic Netlink wiki page.\n  [IPV6] RAW: Don\u0027t release unlocked sock.\n  ...\n"
    },
    {
      "commit": "e18b890bb0881bbab6f4f1a6cd20d9c60d66b003",
      "tree": "4828be07e1c24781c264b42c5a75bcd968223c3f",
      "parents": [
        "441e143e95f5aa1e04026cb0aa71c801ba53982f"
      ],
      "author": {
        "name": "Christoph Lameter",
        "email": "clameter@sgi.com",
        "time": "Wed Dec 06 20:33:20 2006 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@woody.osdl.org",
        "time": "Thu Dec 07 08:39:25 2006 -0800"
      },
      "message": "[PATCH] slab: remove kmem_cache_t\n\nReplace all uses of kmem_cache_t with struct kmem_cache.\n\nThe patch was generated using the following script:\n\n\t#!/bin/sh\n\t#\n\t# Replace one string by another in all the kernel sources.\n\t#\n\n\tset -e\n\n\tfor file in `find * -name \"*.c\" -o -name \"*.h\"|xargs grep -l $1`; do\n\t\tquilt add $file\n\t\tsed -e \"1,\\$s/$1/$2/g\" $file \u003e/tmp/$$\n\t\tmv /tmp/$$ $file\n\t\tquilt refresh\n\tdone\n\nThe script was run like this\n\n\tsh replace kmem_cache_t \"struct kmem_cache\"\n\nSigned-off-by: Christoph Lameter \u003cclameter@sgi.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@osdl.org\u003e\n"
    },
    {
      "commit": "54e6ecb23951b195d02433a741c7f7cb0b796c78",
      "tree": "c8885c49f37c8d383945b8af69d51597494ed62c",
      "parents": [
        "f7267c0c0721fd02ad3dc37c3d6dd24ccd81d4d6"
      ],
      "author": {
        "name": "Christoph Lameter",
        "email": "clameter@sgi.com",
        "time": "Wed Dec 06 20:33:16 2006 -0800"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@woody.osdl.org",
        "time": "Thu Dec 07 08:39:24 2006 -0800"
      },
      "message": "[PATCH] slab: remove SLAB_ATOMIC\n\nSLAB_ATOMIC is an alias of GFP_ATOMIC\n\nSigned-off-by: Christoph Lameter \u003cclameter@sgi.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@osdl.org\u003e\n"
    },
    {
      "commit": "c9204d9ca79baac564b49d36d0228a69d7ded084",
      "tree": "190698c8b1198eda24fa63c8bf562436e6b6fb6f",
      "parents": [
        "161a09e737f0761ca064ee6a907313402f7a54b6"
      ],
      "author": {
        "name": "Joy Latten",
        "email": "latten@austin.ibm.com",
        "time": "Thu Nov 30 15:50:43 2006 -0600"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Dec 06 20:14:23 2006 -0800"
      },
      "message": "audit: disable ipsec auditing when CONFIG_AUDITSYSCALL\u003dn\n\nDisables auditing in ipsec when CONFIG_AUDITSYSCALL is\ndisabled in the kernel.\n\nAlso includes a bug fix for xfrm_state.c as a result of\noriginal ipsec audit patch.\n\nSigned-off-by: Joy Latten \u003clatten@austin.ibm.com\u003e\nSigned-off-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "161a09e737f0761ca064ee6a907313402f7a54b6",
      "tree": "80fdf6dc5de73d810ef0ec811299a5ec3c5ce23e",
      "parents": [
        "95b99a670df31ca5271f503f378e5cac3aee8f5e"
      ],
      "author": {
        "name": "Joy Latten",
        "email": "latten@austin.ibm.com",
        "time": "Mon Nov 27 13:11:54 2006 -0600"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Dec 06 20:14:22 2006 -0800"
      },
      "message": "audit: Add auditing to ipsec\n\nAn audit message occurs when an ipsec SA\nor ipsec policy is created/deleted.\n\nSigned-off-by: Joy Latten \u003clatten@austin.ibm.com\u003e\nSigned-off-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    }
  ],
  "next": "7cf4c1a5fd13820d7591179c0b925d739b2be9a7"
}
