)]}'
{
  "log": [
    {
      "commit": "85efde6f4e0de9577256c5f0030088d3fd4347c1",
      "tree": "28d3f28213e3da05ab3d38ce3ec01f778b713c5e",
      "parents": [
        "9d50638bae05ab7f62d700c9e4a83a1845cf9ef4"
      ],
      "author": {
        "name": "Arnd Bergmann",
        "email": "arnd@arndb.de",
        "time": "Thu Feb 26 00:51:39 2009 +0100"
      },
      "committer": {
        "name": "Ingo Molnar",
        "email": "mingo@elte.hu",
        "time": "Thu Mar 26 18:14:14 2009 +0100"
      },
      "message": "make exported headers use strict posix types\n\nA number of standard posix types are used in exported headers, which\nis not allowed if __STRICT_KERNEL_NAMES is defined. In order to\nget rid of the non-__STRICT_KERNEL_NAMES part and to make sane headers\nthe default, we have to change them all to safe types.\n\nThere are also still some leftovers in reiserfs_fs.h, elfcore.h\nand coda.h, but these files have not compiled in user space for\na long time.\n\nThis leaves out the various integer types ({u_,u,}int{8,16,32,64}_t),\nwhich we take care of separately.\n\nSigned-off-by: Arnd Bergmann \u003carnd@arndb.de\u003e\nAcked-by: Mauro Carvalho Chehab \u003cmchehab@redhat.com\u003e\nCc: David Airlie \u003cairlied@linux.ie\u003e\nCc: Arnaldo Carvalho de Melo \u003cacme@ghostprotocols.net\u003e\nCc: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nCc: netdev@vger.kernel.org\nCc: linux-ppp@vger.kernel.org\nCc: Jaroslav Kysela \u003cperex@perex.cz\u003e\nCc: Takashi Iwai \u003ctiwai@suse.de\u003e\nCc: David Woodhouse \u003cdwmw2@infradead.org\u003e\nSigned-off-by: H. Peter Anvin \u003chpa@linux.intel.com\u003e\nSigned-off-by: Ingo Molnar \u003cmingo@elte.hu\u003e\n"
    },
    {
      "commit": "3a2dfbe8acb154905fdc2fd03ec56df42e6c4cc4",
      "tree": "9dbbc8324deb6463f546e53cd2ac9a676bd0fd55",
      "parents": [
        "93adcc80f3288f1827baf6f821af818f6eeef7f9"
      ],
      "author": {
        "name": "Martin Willi",
        "email": "martin@strongswan.org",
        "time": "Tue Oct 28 16:01:07 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Oct 28 16:01:07 2008 -0700"
      },
      "message": "xfrm: Notify changes in UDP encapsulation via netlink\n\nAdd new_mapping() implementation to the netlink xfrm_mgr to notify\naddress/port changes detected in UDP encapsulated ESP packets.\n\nSigned-off-by: Martin Willi \u003cmartin@strongswan.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "13c1d18931ebb5cf407cb348ef2cd6284d68902d",
      "tree": "6d590f85e48b4cce8f67e42c65b88fce8fcc49c6",
      "parents": [
        "95430c0b140c31cb9e39f876afe1c0e9947d1aaf"
      ],
      "author": {
        "name": "Arnaud Ebalard",
        "email": "arno@natisbad.org",
        "time": "Sun Oct 05 13:33:42 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Oct 05 13:33:42 2008 -0700"
      },
      "message": "xfrm: MIGRATE enhancements (draft-ebalard-mext-pfkey-enhanced-migrate)\n\nProvides implementation of the enhancements of XFRM/PF_KEY MIGRATE mechanism\nspecified in draft-ebalard-mext-pfkey-enhanced-migrate-00. Defines associated\nPF_KEY SADB_X_EXT_KMADDRESS extension and XFRM/netlink XFRMA_KMADDRESS\nattribute.\n\nSigned-off-by: Arnaud Ebalard \u003carno@natisbad.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ccf9b3b83d0e56fbf20c00a08b15031ce13204a7",
      "tree": "ecefe07436ac172dc99deb6e77e7a7cfd5c81155",
      "parents": [
        "0ce28553cc018be5022f51e67c87997f7271534e"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Thu Jul 10 16:55:37 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jul 10 16:55:37 2008 -0700"
      },
      "message": "xfrm: Add a XFRM_STATE_AF_UNSPEC flag to xfrm_usersa_info\n\nAdd a XFRM_STATE_AF_UNSPEC flag to handle the AF_UNSPEC behavior for\nthe selector family. Userspace applications can set this flag to leave\nthe selector family of the xfrm_state unspecified.  This can be used\nto to handle inter family tunnels if the selector is not set from\nuserspace.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "461e6c856faf9cdd8862fa4d0785974a64e39dba",
      "tree": "c28394f1c814b98d993e646dd80717bc9c001d2c",
      "parents": [
        "5b3f129c5592ca35b3fe8916767c58b98710478c"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Fri Apr 25 00:29:00 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Apr 25 00:29:34 2008 -0700"
      },
      "message": "xfrm: alg_key_len \u0026 alg_icv_len should be unsigned\n\nIn commit ba749ae98d5aa9d2ce9a7facde0deed454f92230 ([XFRM]: alg_key_len\nshould be unsigned to avoid integer divides\n\u003chttp://git2.kernel.org/?p\u003dlinux/kernel/git/davem/net-2.6.git;a\u003dcommitdiff;h\u003dba749ae98d5aa9d2ce9a7facde0deed454f92230\u003e)\nalg_key_len field of struct xfrm_algo was converted to unsigned int to\navoid integer divides.\n\nThen Herbert in commit 1a6509d991225ad210de54c63314fd9542922095\n([IPSEC]: Add support for combined mode algorithms) added a new\nstructure xfrm_algo_aead, that resurrected a signed int for alg_key_len\nand re-introduce integer divides.\n\nThis patch avoids these divides and saves 64 bytes of text on i386.\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4c563f7669c10a12354b72b518c2287ffc6ebfb3",
      "tree": "056ec93f192f31640f32983c9e11bc7ce1c0692f",
      "parents": [
        "1e04d530705280770e003ac8db516722cca54758"
      ],
      "author": {
        "name": "Timo Teras",
        "email": "timo.teras@iki.fi",
        "time": "Thu Feb 28 21:31:08 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 28 21:31:08 2008 -0800"
      },
      "message": "[XFRM]: Speed up xfrm_policy and xfrm_state walking\n\nChange xfrm_policy and xfrm_state walking algorithm from O(n^2) to O(n).\nThis is achieved adding the entries to one more list which is used\nsolely for walking the entries.\n\nThis also fixes some races where the dump can have duplicate or missing\nentries when the SPD/SADB is modified during an ongoing dump.\n\nDumping SADB with 20000 entries using \"time ip xfrm state\" the sys\ntime dropped from 1.012s to 0.080s.\n\nSigned-off-by: Timo Teras \u003ctimo.teras@iki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1a6509d991225ad210de54c63314fd9542922095",
      "tree": "afe5c560388558bebd3e21b7c6f789a28a323a51",
      "parents": [
        "6fbf2cb77461a0cd0675228d20dd0f70d7b2251f"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Jan 28 19:37:29 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:27:03 2008 -0800"
      },
      "message": "[IPSEC]: Add support for combined mode algorithms\n\nThis patch adds support for combined mode algorithms with GCM being\nthe first algorithm supported.\n\nCombined mode algorithms can be added through the xfrm_user interface\nusing the new algorithm payload type XFRMA_ALG_AEAD.  Each algorithms\nis identified by its name and the ICV length.\n\nFor the purposes of matching algorithms in xfrm_tmpl structures,\ncombined mode algorithms occupy the same name space as encryption\nalgorithms.  This is in line with how they are negotiated using IKE.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3f4afb6443aaa1d69b2d8f0461c8191e40d54c3c",
      "tree": "756558ed2362542c18f25fe80679b62a0b603043",
      "parents": [
        "ba749ae98d5aa9d2ce9a7facde0deed454f92230"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jan 12 21:31:29 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:02:01 2008 -0800"
      },
      "message": "[XFRM]: Fix struct xfrm_algo code formatting.\n\nRealign struct members.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ba749ae98d5aa9d2ce9a7facde0deed454f92230",
      "tree": "2f4752db0bf40bb590db57435f0a609fa5f8090b",
      "parents": [
        "d88c305a03c37a95c4b27e1a0c2e387bb7ce80df"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Sat Jan 12 21:30:23 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:02:00 2008 -0800"
      },
      "message": "[XFRM]: alg_key_len should be unsigned to avoid integer divides\n\nalg_key_len is currently defined as \u0027signed int\u0027. This unfortunatly\nleads to integer divides in several paths.\n\nConverting it to unsigned is safe and saves 208 bytes of text on i386.\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8b7817f3a959ed99d7443afc12f78a7e1fcc2063",
      "tree": "7e315dfbf5c77e67f6e7ad56f14eaddca621212b",
      "parents": [
        "d5422efe680fc55010c6ddca2370ca9548a96355"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Dec 12 10:44:43 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:23 2008 -0800"
      },
      "message": "[IPSEC]: Add ICMP host relookup support\n\nRFC 4301 requires us to relookup ICMP traffic that does not match any\npolicies using the reverse of its payload.  This patch implements this\nfor ICMP traffic that originates from or terminates on localhost.\n\nThis is activated on outbound with the new policy flag XFRM_POLICY_ICMP,\nand on inbound by the new state flag XFRM_STATE_ICMP.\n\nOn inbound the policy check is now performed by the ICMP protocol so\nthat it can repeat the policy check where necessary.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d5422efe680fc55010c6ddca2370ca9548a96355",
      "tree": "f72fa5eb779c8ae7d49688a9caac9b69a1f3bd58",
      "parents": [
        "815f4e57e9fc67456624ecde0515a901368c78d2"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Dec 12 10:44:16 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:22 2008 -0800"
      },
      "message": "[IPSEC]: Added xfrm_decode_session_reverse and xfrmX_policy_check_reverse\n\nRFC 4301 requires us to relookup ICMP traffic that does not match any\npolicies using the reverse of its payload.  This patch adds the functions\nxfrm_decode_session_reverse and xfrmX_policy_check_reverse so we can get\nthe reverse flow to perform such a lookup.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5a6d34162f5c6f522f857df274f1c8240f161e11",
      "tree": "537d305eef465617944821a1df59da3523a640df",
      "parents": [
        "af11e31609d93765c1b22611592543e028f7aa54"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Fri May 04 12:55:39 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri May 04 12:55:39 2007 -0700"
      },
      "message": "[XFRM] SPD info TLV aggregation\n\nAggregate the SPD info TLVs.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "af11e31609d93765c1b22611592543e028f7aa54",
      "tree": "f8a915dc7d98844667308f7c234d00f59113ff3f",
      "parents": [
        "224711df5c00f7540b89f32a8225866031977f17"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Fri May 04 12:55:13 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri May 04 12:55:13 2007 -0700"
      },
      "message": "[XFRM] SAD info TLV aggregationx\n\nAggregate the SAD info TLVs.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ecfd6b183780c6d9e85873693b3ce6c5f4d08b58",
      "tree": "8ee1330176e3011d3fdf86e70b5933b50302b7e7",
      "parents": [
        "5632c5152aa621885d87ea0b8fdd5a6bb9f69c6f"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Sat Apr 28 21:20:32 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Apr 28 21:20:32 2007 -0700"
      },
      "message": "[XFRM]: Export SPD info\n\nWith this patch you can use iproute2 in user space to efficiently see\nhow many policies exist in different directions.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "28d8909bc790d936ce33f4402adf7577533bbd4b",
      "tree": "8de479d6660aba23bc99fa555c150852548df58d",
      "parents": [
        "98486fa2f4894e2b01e325c659635596bdec1614"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Thu Apr 26 00:10:29 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 26 00:10:29 2007 -0700"
      },
      "message": "[XFRM]: Export SAD info.\n\nOn a system with a lot of SAs, counting SAD entries chews useful\nCPU time since you need to dump the whole SAD to user space;\ni.e something like ip xfrm state ls | grep -i src | wc -l\nI have seen taking literally minutes on a 40K SAs when the system\nis swapping.\nWith this patch, some of the SAD info (that was already being tracked)\nis exposed to user space. i.e you do:\nip xfrm state count\nAnd you get the count; you can also pass -s to the command line and\nget the hash info.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "80c9abaabf4283f7cf4a0b3597cd302506635b7f",
      "tree": "7dd4270a22e039c827114d182c2071a84826f563",
      "parents": [
        "9934e81c8c4981342dab3e386aff5d4499bea0d2"
      ],
      "author": {
        "name": "Shinta Sugimoto",
        "email": "shinta.sugimoto@ericsson.com",
        "time": "Thu Feb 08 13:11:42 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 08 13:11:42 2007 -0800"
      },
      "message": "[XFRM]: Extension for dynamic update of endpoint address(es)\n\nExtend the XFRM framework so that endpoint address(es) in the XFRM\ndatabases could be dynamically updated according to a request (MIGRATE\nmessage) from user application. Target XFRM policy is first identified\nby the selector in the MIGRATE message. Next, the endpoint addresses\nof the matching templates and XFRM states are updated according to\nthe MIGRATE message.\n\nSigned-off-by: Shinta Sugimoto \u003cshinta.sugimoto@ericsson.com\u003e\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "93366c537b3426261cac4db27acc10a99cd91b06",
      "tree": "4a879cfa21d9ff834c1bd40c39c2bca74e44034e",
      "parents": [
        "f0490980a152958d25ce9762bfb296d8fd4c5512"
      ],
      "author": {
        "name": "J Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Fri Dec 08 00:12:15 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 08 17:19:30 2006 -0800"
      },
      "message": "[XFRM]: Fix XFRMGRP_REPORT to use correct multicast group.\n\nXFRMGRP_REPORT uses 0x10 which is a group that belongs\nto events. The correct value is 0x20.\nWe should really be using xfrm_nlgroups going forward; it was tempting\nto delete the definition of XFRMGRP_REPORT but it would break at\nleast iproute2.\n\nSigned-off-by: J Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2b5f6dcce5bf94b9b119e9ed8d537098ec61c3d2",
      "tree": "930dd667fff96a11b7585e14acc594a9c9a632a4",
      "parents": [
        "02dba025b0bc881432cf325bfb124fae523087d5"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Sat Dec 02 22:22:25 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Dec 02 22:22:25 2006 -0800"
      },
      "message": "[XFRM]: Fix aevent structuring to be more complete.\n\naevents can not uniquely identify an SA. We break the ABI with this\npatch, but consensus is that since it is not yet utilized by any\n(known) application then it is fine (better do it now than later).\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d5a0a1e3109339090769e40fdaa62482fcf2a717",
      "tree": "e151364d1930a90c551faae4fd85fb6fcd88baa3",
      "parents": [
        "4806126d78345ad8a99bca1367a8a39c08e19393"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Wed Nov 08 00:23:14 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Dec 02 21:21:17 2006 -0800"
      },
      "message": "[IPV4]: encapsulation annotations\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0a69452cb45add0841c2bc1e75c25f6bd4f1d8d9",
      "tree": "17906377f0f55c809126932e3a0e4b9bb972739c",
      "parents": [
        "80246ab36ec8baf7d107254adb166baa555a59f8"
      ],
      "author": {
        "name": "Diego Beltrami",
        "email": "diego.beltrami@gmail.com",
        "time": "Tue Oct 03 23:47:05 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 04 00:31:09 2006 -0700"
      },
      "message": "[XFRM]: BEET mode\n\nThis patch introduces the BEET mode (Bound End-to-End Tunnel) with as\nspecified by the ietf draft at the following link:\n\nhttp://www.ietf.org/internet-drafts/draft-nikander-esp-beet-mode-06.txt\n\nThe patch provides only single family support (i.e. inner family \u003d\nouter family).\n\nSigned-off-by: Diego Beltrami \u003cdiego.beltrami@gmail.com\u003e\nSigned-off-by: Miika Komu     \u003cmiika@iki.fi\u003e\nSigned-off-by: Herbert Xu     \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: Abhinav Pathak \u003cabhinav.pathak@hiit.fi\u003e\nSigned-off-by: Jeff Ahrenholz \u003cahrenholz@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9916ecb0a6f52f1475fa2f71845227d3c75fb40c",
      "tree": "554243e1ad82c21468b2bff19f4c5db86093ad8b",
      "parents": [
        "61f4627b2fecce9d5c9645e4b47e75a0c29ad8c3"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Wed Sep 27 18:48:48 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Sep 28 18:02:42 2006 -0700"
      },
      "message": "[XFRM]: struct xfrm_usersa_id annotations\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e037c39bf965ca66fde902e191d849a90de278fe",
      "tree": "2c7738234504e30d7011970c63da57daaf784b42",
      "parents": [
        "a94cfd19744a568d97b14bbaa500b2a0c3684f34"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Wed Sep 27 18:47:40 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Sep 28 18:02:38 2006 -0700"
      },
      "message": "[XFRM]: struct xfrm_id annotations\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "737b5761dfc609b5be4163deb2cf09226f56bcbc",
      "tree": "a9ac88da54380293245672095a311934706c8100",
      "parents": [
        "5f19343fb19613539355296b23cbc08d1336b52d"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Wed Sep 27 18:46:48 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Sep 28 18:02:35 2006 -0700"
      },
      "message": "[XFRM]: xfrm_address_t annotations\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8f83f23e6db8b9a9fe787d02f73489224668c4e2",
      "tree": "23348f11be718d24229ced9c49c0d2c82c759104",
      "parents": [
        "f9d07e41f89e7305eb2c0475c170c51d21425581"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Wed Sep 27 18:46:11 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Sep 28 18:02:33 2006 -0700"
      },
      "message": "[XFRM]: ports in struct xfrm_selector annotated\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f7b6983f0feeefcd2a594138adcffe640593d8de",
      "tree": "41878fad9f0f0306718fa832eac7dfa76f51222d",
      "parents": [
        "41a49cc3c02ace59d4dddae91ea211c330970ee3"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Wed Aug 23 22:49:28 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Sep 22 15:08:35 2006 -0700"
      },
      "message": "[XFRM] POLICY: Support netlink socket interface for sub policy.\n\nSub policy can be used through netlink socket.\nPF_KEY uses main only and it is TODO to support sub.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4e81bb8336a0ac50289d4d4c7a55e559b994ee8f",
      "tree": "fefa71843c3f8152dd0a008b3b40fe2e42d204d7",
      "parents": [
        "c11f1a15c522ddd3bbd2c32b5ce3e0b1831b22f2"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Wed Aug 23 22:43:30 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Sep 22 15:08:34 2006 -0700"
      },
      "message": "[XFRM] POLICY: sub policy support.\n\nSub policy is introduced. Main and sub policy are applied the same flow.\n(Policy that current kernel uses is named as main.)\nIt is required another transformation policy management to keep IPsec\nand Mobile IPv6 lives separate.\nPolicy which lives shorter time in kernel should be a sub i.e. normally\nmain is for IPsec and sub is for Mobile IPv6.\n(Such usage as two IPsec policies on different database can be used, too.)\n\nLimitation or TODOs:\n - Sub policy is not supported for per socket one (it is always inserted as main).\n - Current kernel makes cached outbound with flowi to skip searching database.\n   However this patch makes it disabled only when \"two policies are used and\n   the first matched one is bypass case\" because neither flowi nor bundle\n   information knows about transformation template size.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "97a64b4577ae2bc5599dbd008a3cd9e25de9b9f5",
      "tree": "424700fb0a41b28c5615d0d21ca74d699e1fa872",
      "parents": [
        "df0ba92a99ca757039dfa84a929281ea3f7a50e8"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Wed Aug 23 20:44:06 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Sep 22 15:08:30 2006 -0700"
      },
      "message": "[XFRM]: Introduce XFRM_MSG_REPORT.\n\nXFRM_MSG_REPORT is a message as notification of state protocol and\nselector from kernel to user-space.\n\nMobile IPv6 will use it when inbound reject is occurred at route\noptimization to make user-space know a binding error requirement.\n\nBased on MIPL2 kernel patch.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9afaca057980c02771f4657c455cc7592fcd7373",
      "tree": "3ef6e1b304248fad27c8063b7fbffdba966a0671",
      "parents": [
        "060f02a3bdd4d9ba8aa3c48e9b470672b1f3a585"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Wed Aug 23 18:20:16 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Sep 22 15:06:43 2006 -0700"
      },
      "message": "[XFRM] IPV6: Update outbound state timestamp for each sending.\n\nWith this patch transformation state is updated last used time\nfor each sending. Xtime is used for it like other state lifetime\nexpiration.\nMobile IPv6 enabled nodes will want to know traffic status of each\nbinding (e.g. judgement to request binding refresh by correspondent node,\nor to keep home/care-of nonce alive by mobile node).\nThe last used timestamp is an important hint about it.\nBased on MIPL2 kernel patch.\n\nThis patch was also written by: Henrik Petander \u003cpetander@tcs.hut.fi\u003e\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "060f02a3bdd4d9ba8aa3c48e9b470672b1f3a585",
      "tree": "0eb60cf50ad70ceb856c82c32124470f6bce2d86",
      "parents": [
        "1b5c229987dc4d0c92a38fac0cde2aeec08cd775"
      ],
      "author": {
        "name": "Noriaki TAKAMIYA",
        "email": "takamiya@po.ntts.co.jp",
        "time": "Wed Aug 23 18:18:55 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Sep 22 15:06:42 2006 -0700"
      },
      "message": "[XFRM] STATE: Introduce care-of address.\n\nCare-of address is carried by state as a transformation option like\nIPsec encryption/authentication algorithm.\n\nBased on MIPL2 kernel patch.\n\nSigned-off-by: Noriaki TAKAMIYA \u003ctakamiya@po.ntts.co.jp\u003e\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "fbd9a5b47ee9c319ff0cae584391241ce78ffd6b",
      "tree": "3e6cdcf297e3f82b7ab276e5ffa59abfcb912f44",
      "parents": [
        "f3bd484021d9486b826b422a017d75dd0bd258ad"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Wed Aug 23 18:08:21 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Sep 22 15:06:39 2006 -0700"
      },
      "message": "[XFRM] STATE: Common receive function for route optimization extension headers.\n\nXFRM_STATE_WILDRECV flag is introduced; the last resort state is set\nit and receives packet which is not route optimized but uses such\nextension headers i.e. Mobile IPv6 signaling (binding update and\nacknowledgement).  A node enabled Mobile IPv6 adds the state.\n\nBased on MIPL2 kernel patch.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "eb2971b68a7d17a7d0fa2c7fc6fbc4bfe41cd694",
      "tree": "5f6e98ac376d0d2faa69e8a6644706a7312a1ff1",
      "parents": [
        "6c44e6b7ab500d7e3e3f406c83325671be51a752"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Wed Aug 23 17:56:04 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Sep 22 15:06:35 2006 -0700"
      },
      "message": "[XFRM] STATE: Search by address using source address list.\n\nThis is a support to search transformation states by its addresses\nby using source address list for Mobile IPv6 usage.\nTo use it from user-space, it is also added a message type for\nsource address as a xfrm state option.\nBased on MIPL2 kernel patch.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7e49e6de30efa716614e280d97963c570f3acf29",
      "tree": "8eaef9d40300d16a7675722e082c5d8ab2a53d40",
      "parents": [
        "77d16f450ae0452d7d4b009f78debb1294fb435c"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Fri Sep 22 15:05:15 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Sep 22 15:05:15 2006 -0700"
      },
      "message": "[XFRM]: Add XFRM_MODE_xxx for future use.\n\nTransformation mode is used as either IPsec transport or tunnel.\nIt is required to add two more items, route optimization and inbound trigger\nfor Mobile IPv6.\nBased on MIPL2 kernel patch.\n\nThis patch was also written by: Ville Nuorvala \u003cvnuorval@tcs.hut.fi\u003e\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b59f45d0b2878ab76f8053b0973654e6621828ee",
      "tree": "40dc5e2ede2620f7935fb3dae0d0eb199851f611",
      "parents": [
        "546be2405be119ef55467aace45f337a16e5d424"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat May 27 23:05:54 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Jun 17 21:28:39 2006 -0700"
      },
      "message": "[IPSEC] xfrm: Abstract out encapsulation modes\n\nThis patch adds the structure xfrm_mode.  It is meant to represent\nthe operations carried out by transport/tunnel modes.\n\nBy doing this we allow additional encapsulation modes to be added\nwithout clogging up the xfrm_input/xfrm_output paths.\n\nCandidate modes include 4-to-6 tunnel mode, 6-to-4 tunnel mode, and\nBEET modes.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4bf07ef3fd5db2df7d1899fcf9c67d2263ead2e2",
      "tree": "353775ab0c4777c864e7e0297abed0a9eb76235a",
      "parents": [
        "b61fafc4ef3faf54236d57e3b230ca19167663bf"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Mon Mar 20 21:25:50 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 21:25:50 2006 -0800"
      },
      "message": "[XFRM]: Rearrange struct xfrm_aevent_id for better compatibility.\n\nstruct xfrm_aevent_id needs to be 32-bit + 64-bit align friendly.\n\nBased upon suggestions from Yoshifuji.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f8cd54884e675dfaf0c86cc7c088adb6ca9d7638",
      "tree": "7850e8ebebf1f8543c96acdd7c197003b3b4d54c",
      "parents": [
        "f5539eb8caa52a9198079df767cc1bb5494e69e3"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Mon Mar 20 19:15:11 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 19:15:11 2006 -0800"
      },
      "message": "[IPSEC]: Sync series - core changes\n\nThis patch provides the core functionality needed for sync events\nfor ipsec. Derived work of Krisztian KOVACS \u003chidden@balabit.hu\u003e\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "df71837d5024e2524cd51c93621e558aa7dd9f3f",
      "tree": "58938f1d46f3c6713b63e5a785e82fdbb10121a1",
      "parents": [
        "88026842b0a760145aa71d69e74fbc9ec118ca44"
      ],
      "author": {
        "name": "Trent Jaeger",
        "email": "tjaeger@cse.psu.edu",
        "time": "Tue Dec 13 23:12:27 2005 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Jan 03 13:10:24 2006 -0800"
      },
      "message": "[LSM-IPSec]: Security association restriction.\n\nThis patch series implements per packet access control via the\nextension of the Linux Security Modules (LSM) interface by hooks in\nthe XFRM and pfkey subsystems that leverage IPSec security\nassociations to label packets.  Extensions to the SELinux LSM are\nincluded that leverage the patch for this purpose.\n\nThis patch implements the changes necessary to the XFRM subsystem,\npfkey interface, ipv4/ipv6, and xfrm_user interface to restrict a\nsocket to use only authorized security associations (or no security\nassociation) to send/receive network packets.\n\nPatch purpose:\n\nThe patch is designed to enable access control per packets based on\nthe strongly authenticated IPSec security association.  Such access\ncontrols augment the existing ones based on network interface and IP\naddress.  The former are very coarse-grained, and the latter can be\nspoofed.  By using IPSec, the system can control access to remote\nhosts based on cryptographic keys generated using the IPSec mechanism.\nThis enables access control on a per-machine basis or per-application\nif the remote machine is running the same mechanism and trusted to\nenforce the access control policy.\n\nPatch design approach:\n\nThe overall approach is that policy (xfrm_policy) entries set by\nuser-level programs (e.g., setkey for ipsec-tools) are extended with a\nsecurity context that is used at policy selection time in the XFRM\nsubsystem to restrict the sockets that can send/receive packets via\nsecurity associations (xfrm_states) that are built from those\npolicies.\n\nA presentation available at\nwww.selinux-symposium.org/2005/presentations/session2/2-3-jaeger.pdf\nfrom the SELinux symposium describes the overall approach.\n\nPatch implementation details:\n\nOn output, the policy retrieved (via xfrm_policy_lookup or\nxfrm_sk_policy_lookup) must be authorized for the security context of\nthe socket and the same security context is required for resultant\nsecurity association (retrieved or negotiated via racoon in\nipsec-tools).  This is enforced in xfrm_state_find.\n\nOn input, the policy retrieved must also be authorized for the socket\n(at __xfrm_policy_check), and the security context of the policy must\nalso match the security association being used.\n\nThe patch has virtually no impact on packets that do not use IPSec.\nThe existing Netfilter (outgoing) and LSM rcv_skb hooks are used as\nbefore.\n\nAlso, if IPSec is used without security contexts, the impact is\nminimal.  The LSM must allow such policies to be selected for the\ncombination of socket and remote machine, but subsequent IPSec\nprocessing proceeds as in the original case.\n\nTesting:\n\nThe pfkey interface is tested using the ipsec-tools.  ipsec-tools have\nbeen modified (a separate ipsec-tools patch is available for version\n0.5) that supports assignment of xfrm_policy entries and security\nassociations with security contexts via setkey and the negotiation\nusing the security contexts via racoon.\n\nThe xfrm_user interface is tested via ad hoc programs that set\nsecurity contexts.  These programs are also available from me, and\ncontain programs for setting, getting, and deleting policy for testing\nthis interface.  Testing of sa functions was done by tracing kernel\nbehavior.\n\nSigned-off-by: Trent Jaeger \u003ctjaeger@cse.psu.edu\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ac6d439d2097b72ea0cbc2322ce1263a38bc1fd0",
      "tree": "19e638a226993dddede5a2da577e2572f7555a95",
      "parents": [
        "d629b836d151d43332492651dd841d32e57ebe3b"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Aug 14 19:29:52 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Aug 29 16:00:54 2005 -0700"
      },
      "message": "[NETLINK]: Convert netlink users to use group numbers instead of bitmasks\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "dd87147eed934eaff92869f3d158697c7239d1d2",
      "tree": "5a5d59c2678767530c2a3299a70ccfc14062b347",
      "parents": [
        "d094cd83c06e06e01d8edb540555f3f64e4081c2"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Jun 20 13:21:43 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jun 20 13:21:43 2005 -0700"
      },
      "message": "[IPSEC]: Add XFRM_STATE_NOPMTUDISC flag\n\nThis patch adds the flag XFRM_STATE_NOPMTUDISC for xfrm states.  It is\nsimilar to the nopmtudisc on IPIP/GRE tunnels.  It only has an effect\non IPv4 tunnel mode states.  For these states, it will ensure that the\nDF flag is always cleared.\n\nThis is primarily useful to work around ICMP blackholes.\n\nIn future this flag could also allow a larger MTU to be set within the\ntunnel just like IPIP/GRE tunnels.  This could be useful for short haul\ntunnels where temporary fragmentation outside the tunnel is desired over\nsmaller fragments inside the tunnel.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nAcked-by: James Morris \u003cjmorris@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0603eac0d6b77acac5924a2734228cbaf072f993",
      "tree": "e51536aab48997cc74f83bc618b95a9d88df12f2",
      "parents": [
        "b6544c0b4cf2bd96195f3cdb7cebfb35090fc557"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat Jun 18 22:54:36 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:54:36 2005 -0700"
      },
      "message": "[IPSEC]: Add XFRMA_SA/XFRMA_POLICY for delete notification\n\nThis patch changes the format of the XFRM_MSG_DELSA and\nXFRM_MSG_DELPOLICY notification so that the main message\nsent is of the same format as that received by the kernel\nif the original message was via netlink.  This also means\nthat we won\u0027t lose the byid information carried in km_event.\n\nSince this user interface is introduced by Jamal\u0027s patch\nwe can still afford to change it.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "26b15dad9f1c19d6d4f7b999b07eaa6d98e4b375",
      "tree": "2ca3039488d9df023fb84eaa7c1f52aa8d1ce69c",
      "parents": [
        "3aa3dfb372576f30835a94409556e3c8681b5756"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Sat Jun 18 22:42:13 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:42:13 2005 -0700"
      },
      "message": "[IPSEC] Add complete xfrm event notification\n\nHeres the final patch.\nWhat this patch provides\n\n- netlink xfrm events\n- ability to have events generated by netlink propagated to pfkey\n  and vice versa.\n- fixes the acquire lets-be-happy-with-one-success issue\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "492b558b3191319cbc859a9e025bc354d336c261",
      "tree": "44e4aef7da73c9d4fd0e31bdfe26399f52a9f0cd",
      "parents": [
        "526bdb80a23b2e10ed4ccc3fcf309c9118d892d6"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Tue May 03 14:26:40 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 03 14:26:40 2005 -0700"
      },
      "message": "[XFRM]: Cleanup xfrm_msg_min and xfrm_dispatch\n\nConverts xfrm_msg_min and xfrm_dispatch to use c99 designated\ninitializers to make greping a little bit easier. Also replaces\ntwo hardcoded message type with meaningful names.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "526bdb80a23b2e10ed4ccc3fcf309c9118d892d6",
      "tree": "d1e681c9404a7ce9ab24f14d198b44b316043f6d",
      "parents": [
        "e4553eddae592b948c9695c9a0002169b0cab6fc"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Tue May 03 14:26:01 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 03 14:26:01 2005 -0700"
      },
      "message": "[XFRM]: Prevent off-by-one access to xfrm_dispatch\n\nMakes the type \u003e XFRM_MSG_MAX check behave correctly to\nprotect access to xfrm_dispatch.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
      "tree": "0bba044c4ce775e45a88a51686b5d9f90697ea9d",
      "parents": [],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@ppc970.osdl.org",
        "time": "Sat Apr 16 15:20:36 2005 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@ppc970.osdl.org",
        "time": "Sat Apr 16 15:20:36 2005 -0700"
      },
      "message": "Linux-2.6.12-rc2\n\nInitial git repository build. I\u0027m not bothering with the full history,\neven though we have it. We can create a separate \"historical\" git\narchive of that later if we want to, and in the meantime it\u0027s about\n3.2GB when imported into git - space that would just make the early\ngit days unnecessarily complicated, when we don\u0027t have a lot of good\ninfrastructure for it.\n\nLet it rip!\n"
    }
  ]
}
