)]}'
{
  "log": [
    {
      "commit": "f5184d267c1aedb9b7a8cc44e08ff6b8d382c3b5",
      "tree": "5ccce7558f9e1e53e5b189d6e2fe62a667988ac8",
      "parents": [
        "8388e3da34edb141362bb42811ee487dfec15525"
      ],
      "author": {
        "name": "Johannes Berg",
        "email": "johannes@sipsolutions.net",
        "time": "Mon May 12 20:48:31 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon May 12 20:48:31 2008 -0700"
      },
      "message": "net: Allow netdevices to specify needed head/tailroom\n\nThis patch adds needed_headroom/needed_tailroom members to struct\nnet_device and updates many places that allocate sbks to use them. Not\nall of them can be converted though, and I\u0027m sure I missed some (I\nmostly grepped for LL_RESERVED_SPACE)\n\nSigned-off-by: Johannes Berg \u003cjohannes@sipsolutions.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9781db7b345b5dfe93787aaaf310c861db7c1ede",
      "tree": "d9796e29fd914ca04835636be95bbd5082a034fd",
      "parents": [
        "97094dcf5cefc8ccfdf93839f54dac2c4d316165",
        "8b67dca9420474623709e00d72a066068a502b20"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 29 11:41:22 2008 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 29 11:41:22 2008 -0700"
      },
      "message": "Merge branch \u0027audit.b50\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/viro/audit-current\n\n* \u0027audit.b50\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/viro/audit-current:\n  [PATCH] new predicate - AUDIT_FILETYPE\n  [patch 2/2] Use find_task_by_vpid in audit code\n  [patch 1/2] audit: let userspace fully control TTY input auditing\n  [PATCH 2/2] audit: fix sparse shadowed variable warnings\n  [PATCH 1/2] audit: move extern declarations to audit.h\n  Audit: MAINTAINERS update\n  Audit: increase the maximum length of the key field\n  Audit: standardize string audit interfaces\n  Audit: stop deadlock from signals under load\n  Audit: save audit_backlog_limit audit messages in case auditd comes back\n  Audit: collect sessionid in netlink messages\n  Audit: end printk with newline\n"
    },
    {
      "commit": "801678c5a3b4c79236970bcca27c733f5559e0d1",
      "tree": "5ad4761f539525077895f261b64fccda4d1303c4",
      "parents": [
        "9a6f70bbed4e8b72dd340812d7c606bfd5e00b47"
      ],
      "author": {
        "name": "Hirofumi Nakagawa",
        "email": "hnakagawa@miraclelinux.com",
        "time": "Tue Apr 29 01:03:09 2008 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Apr 29 08:06:25 2008 -0700"
      },
      "message": "Remove duplicated unlikely() in IS_ERR()\n\nSome drivers have duplicated unlikely() macros.  IS_ERR() already has\nunlikely() in itself.\n\nThis patch cleans up such pointless code.\n\nSigned-off-by: Hirofumi Nakagawa \u003chnakagawa@miraclelinux.com\u003e\nAcked-by: David S. Miller \u003cdavem@davemloft.net\u003e\nAcked-by: Jeff Garzik \u003cjeff@garzik.org\u003e\nCc: Paul Clements \u003cpaul.clements@steeleye.com\u003e\nCc: Richard Purdie \u003crpurdie@rpsys.net\u003e\nCc: Alessandro Zummo \u003ca.zummo@towertech.it\u003e\nCc: David Brownell \u003cdavid-b@pacbell.net\u003e\nCc: James Bottomley \u003cJames.Bottomley@HansenPartnership.com\u003e\nCc: Michael Halcrow \u003cmhalcrow@us.ibm.com\u003e\nCc: Anton Altaparmakov \u003caia21@cantab.net\u003e\nCc: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\nCc: Carsten Otte \u003ccotte@de.ibm.com\u003e\nCc: Patrick McHardy \u003ckaber@trash.net\u003e\nCc: Paul Mundt \u003clethal@linux-sh.org\u003e\nCc: Jaroslav Kysela \u003cperex@perex.cz\u003e\nCc: Takashi Iwai \u003ctiwai@suse.de\u003e\nAcked-by: Mike Frysinger \u003cvapier@gentoo.org\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "2532386f480eefbdd67b48be55fb4fb3e5a6081c",
      "tree": "dd6a5a3c4116a67380a1336319c16632f04f80f9",
      "parents": [
        "436c405c7d19455a71f42c9bec5fd5e028f1eb4e"
      ],
      "author": {
        "name": "Eric Paris",
        "email": "eparis@redhat.com",
        "time": "Fri Apr 18 10:09:25 2008 -0400"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Mon Apr 28 06:18:03 2008 -0400"
      },
      "message": "Audit: collect sessionid in netlink messages\n\nPreviously I added sessionid output to all audit messages where it was\navailable but we still didn\u0027t know the sessionid of the sender of\nnetlink messages.  This patch adds that information to netlink messages\nso we can audit who sent netlink messages.\n\nSigned-off-by: Eric Paris \u003ceparis@redhat.com\u003e\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "01a2202c95989a4df48e9a5b5e013cb80c6b2d66",
      "tree": "8eb1bd6cc4f99fc9fc3def2cc81ab256fe40e206",
      "parents": [
        "0b80ae4201e5128e16e5161825f5cd377a5d1fee"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Apr 27 00:59:59 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Apr 27 14:26:52 2008 -0700"
      },
      "message": "[IPSEC]: Use digest_null directly for auth\n\nPreviously digest_null had no setkey function which meant that\nwe used hmac(digest_null) for IPsec since IPsec always calls\nsetkey.  Now that digest_null has a setkey we no longer need to\ndo that.\n\nIn fact when only confidentiality is specified for ESP we already\nuse digest_null directly.  However, when the null algorithm is\nexplicitly specified by the user we still opt for hmac(digest_null).\n\nThis patch removes this discrepancy.  I have not added a new compat\nname for it because by chance it wasn\u0027t actualy possible for the user\nto specify the name hmac(digest_null) due to a key length check in\nxfrm_user (which I found out when testing that compat name :)\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5e2c433d9f84dd9b0e01ef8607380d53a7f64d69",
      "tree": "c43f9f0a327ecb6c9393e03b383b8895fb8530bd",
      "parents": [
        "653252c2302cdf2dfbca66a7e177f7db783f9efa"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Sat Apr 26 22:24:10 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Apr 27 14:26:48 2008 -0700"
      },
      "message": "[XFRM] AUDIT: Fix flowlabel text format ambibuity.\n\nFlowlabel text format was not correct and thus ambiguous.\nFor example, 0x00123 or 0x01203 are formatted as 0x123.\nThis is not what audit tools want.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c5d18e984a313adf5a1a4ae69e0b1d93cf410229",
      "tree": "2922514a388759b999757eec49b7a5bd9f290e3c",
      "parents": [
        "7c3f944e29c02d71e13442e977cf4cec19c39e98"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Apr 22 00:46:42 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Apr 22 00:46:42 2008 -0700"
      },
      "message": "[IPSEC]: Fix catch-22 with algorithm IDs above 31\n\nAs it stands it\u0027s impossible to use any authentication algorithms\nwith an ID above 31 portably.  It just happens to work on x86 but\nfails miserably on ppc64.\n\nThe reason is that we\u0027re using a bit mask to check the algorithm\nID but the mask is only 32 bits wide.\n\nAfter looking at how this is used in the field, I have concluded\nthat in the long term we should phase out state matching by IDs\nbecause this is made superfluous by the reqid feature.  For current\napplications, the best solution IMHO is to allow all algorithms when\nthe bit masks are all ~0.\n\nThe following patch does exactly that.\n\nThis bug was identified by IBM when testing on the ppc64 platform\nusing the NULL authentication algorithm which has an ID of 251.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2c8dd11636e3a5f14a7fb765331b7043f01fe937",
      "tree": "ad264804033c49c507865ecff7f9c61f506debce",
      "parents": [
        "569508c964a8b5235e00998523bc3acd3f6aff01"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Mon Apr 14 14:47:48 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 14 14:47:48 2008 -0700"
      },
      "message": "[XFRM]: Compilation warnings in xfrm_user.c.\n\nWhen CONFIG_SECURITY_NETWORK_XFRM is undefined the following warnings appears:\nnet/xfrm/xfrm_user.c: In function \u0027xfrm_add_pol_expire\u0027:\nnet/xfrm/xfrm_user.c:1576: warning: \u0027ctx\u0027 may be used uninitialized in this function\nnet/xfrm/xfrm_user.c: In function \u0027xfrm_get_policy\u0027:\nnet/xfrm/xfrm_user.c:1340: warning: \u0027ctx\u0027 may be used uninitialized in this function\n(security_xfrm_policy_alloc is noop for the case).\n\nIt seems that they are result of the commit\n03e1ad7b5d871d4189b1da3125c2f12d1b5f7d0b (\"LSM: Make the Labeled IPsec\nhooks more stack friendly\")\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "df39e8ba56a788733d369068c7319e04b1da3cd5",
      "tree": "1e9be853bdb455e341cdbf957656f342cfa2eb9e",
      "parents": [
        "f5572855ec492334d8c3ec0e0e86c31865d5cf07",
        "159d83363b629c91d020734207c1bc788b96af5a"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 14 02:30:23 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 14 02:30:23 2008 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6\n\nConflicts:\n\n\tdrivers/net/ehea/ehea_main.c\n\tdrivers/net/wireless/iwlwifi/Kconfig\n\tdrivers/net/wireless/rt2x00/rt61pci.c\n\tnet/ipv4/inet_timewait_sock.c\n\tnet/ipv6/raw.c\n\tnet/mac80211/ieee80211_sta.c\n"
    },
    {
      "commit": "03e1ad7b5d871d4189b1da3125c2f12d1b5f7d0b",
      "tree": "1e7f291ac6bd0c1f3a95e8252c32fcce7ff47ea7",
      "parents": [
        "00447872a643787411c2c0cb1df6169dda8b0c47"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Sat Apr 12 19:07:52 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Apr 12 19:07:52 2008 -0700"
      },
      "message": "LSM: Make the Labeled IPsec hooks more stack friendly\n\nThe xfrm_get_policy() and xfrm_add_pol_expire() put some rather large structs\non the stack to work around the LSM API.  This patch attempts to fix that\nproblem by changing the LSM API to require only the relevant \"security\"\npointers instead of the entire SPD entry; we do this for all of the\nsecurity_xfrm_policy*() functions to keep things consistent.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "bcf0dda8d2408fe1c1040cdec5a98e5fcad2ac72",
      "tree": "33117ad780d212f8a83c007ccc1b95bc0debbdbf",
      "parents": [
        "21f644f3eabde637f255f75ad05d0821a7a36b7f"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Wed Apr 09 15:08:24 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 09 15:08:24 2008 -0700"
      },
      "message": "[XFRM]: xfrm_user: fix selector family initialization\n\nCommit df9dcb45 ([IPSEC]: Fix inter address family IPsec tunnel handling)\nbroke openswan by removing the selector initialization for tunnel mode\nin case it is uninitialized.\n\nThis patch restores the initialization, fixing openswan, but probably\nbreaking inter-family tunnels again (unknown since the patch author\ndisappeared). The correct thing for inter-family tunnels is probably\nto simply initialize the selector family explicitly.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8e8e43843ba3ced0c657cbc0fdb10644ec60f772",
      "tree": "e64954326ced9c365c52c256f01b5f9fb1bcae66",
      "parents": [
        "ed85f2c3b2b72bd20f617ac749f5c22be8d0f66e",
        "50fd4407b8bfbde7c1a0bfe4f24de7df37164342"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 27 18:48:56 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Mar 27 18:48:56 2008 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6\n\nConflicts:\n\n\tdrivers/net/usb/rndis_host.c\n\tdrivers/net/wireless/b43/dma.c\n\tnet/ipv6/ndisc.c\n"
    },
    {
      "commit": "c346dca10840a874240c78efe3f39acf4312a1f2",
      "tree": "c04cff20124eba5cc337cc5ec260ad2513eeb065",
      "parents": [
        "7cbca67c073263c179f605bdbbdc565ab29d801d"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Tue Mar 25 21:47:49 2008 +0900"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Wed Mar 26 04:39:53 2008 +0900"
      },
      "message": "[NET] NETNS: Omit net_device-\u003end_net without CONFIG_NET_NS.\n\nIntroduce per-net_device inlines: dev_net(), dev_net_set().\nWithout CONFIG_NET_NS, no namespace other than \u0026init_net exists.\nLet\u0027s explicitly define them to help compiler optimizations.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "9bb182a7007515239091b237fe7169b1328a61d3",
      "tree": "7be7f556c58c650a547a0db34058f8ffffbf98aa",
      "parents": [
        "df8ea19b5d2e7512095bb1e0737513b8da196d64"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Fri Feb 22 14:48:22 2008 +0900"
      },
      "committer": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Tue Mar 25 10:23:57 2008 +0900"
      },
      "message": "[XFRM] MIP6: Fix address keys for routing search.\n\nEach MIPv6 XFRM state (DSTOPT/RH2) holds either destination or source\naddress to be mangled in the IPv6 header (that is \"CoA\").\nOn Inter-MN communication after both nodes binds each other,\nthey use route optimized traffic two MIPv6 states applied, and\nboth source and destination address in the IPv6 header\nare replaced by the states respectively.\nThe packet format is correct, however, next-hop routing search\nare not.\nThis patch fixes it by remembering address pairs for later states.\n\nBased on patch from Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n"
    },
    {
      "commit": "df9dcb4588aca9cc243cf1f3f454361a84e1cbdb",
      "tree": "53dabed7cffee752109808cbea2f812e0a6d7faf",
      "parents": [
        "fa86d322d89995fef1bfb5cc768b89d8c22ea0d9"
      ],
      "author": {
        "name": "Kazunori MIYAZAWA",
        "email": "kazunori@miyazawa.org",
        "time": "Mon Mar 24 14:51:51 2008 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 24 14:51:51 2008 -0700"
      },
      "message": "[IPSEC]: Fix inter address family IPsec tunnel handling.\n\nSigned-off-by: Kazunori MIYAZAWA \u003ckazunori@miyazawa.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4c563f7669c10a12354b72b518c2287ffc6ebfb3",
      "tree": "056ec93f192f31640f32983c9e11bc7ce1c0692f",
      "parents": [
        "1e04d530705280770e003ac8db516722cca54758"
      ],
      "author": {
        "name": "Timo Teras",
        "email": "timo.teras@iki.fi",
        "time": "Thu Feb 28 21:31:08 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 28 21:31:08 2008 -0800"
      },
      "message": "[XFRM]: Speed up xfrm_policy and xfrm_state walking\n\nChange xfrm_policy and xfrm_state walking algorithm from O(n^2) to O(n).\nThis is achieved adding the entries to one more list which is used\nsolely for walking the entries.\n\nThis also fixes some races where the dump can have duplicate or missing\nentries when the SPD/SADB is modified during an ongoing dump.\n\nDumping SADB with 20000 entries using \"time ip xfrm state\" the sys\ntime dropped from 1.012s to 0.080s.\n\nSigned-off-by: Timo Teras \u003ctimo.teras@iki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b791160b5af4ea95c72fb59d13079664beca1963",
      "tree": "7c5b3e4d4875c002c8315c05ced0e16392eb2a30",
      "parents": [
        "82453021b8be85171350c695d7ebafe7b517c812"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Sun Feb 17 23:29:30 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 17 23:29:30 2008 -0800"
      },
      "message": "[XFRM]: Fix ordering issue in xfrm_dst_hash_transfer().\n\nKeep ordering of policy entries with same selector in\nxfrm_dst_hash_transfer().\n\nIssue should not appear in usual cases because multiple policy entries\nwith same selector are basically not allowed so far.  Bug was pointed\nout by Sebastien Decugis \u003csdecugis@hongo.wide.ad.jp\u003e.\n\nWe could convert bydst from hlist to list and use list_add_tail()\ninstead.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nAcked-by: Sebastien Decugis \u003csdecugis@hongo.wide.ad.jp\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "073a371987f9a9806a85329eed51dca1fc52a7a0",
      "tree": "924aafe5a1be81eb44b7a4756c58edebce5f9da5",
      "parents": [
        "a4d6b8af1e92daa872f55d06415b76c35f44d8bd"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu Feb 14 14:52:38 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 14 14:52:38 2008 -0800"
      },
      "message": "[XFRM]: Avoid bogus BUG() when throwing new policy away.\n\nFrom: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\n\nWhen we destory a new policy entry, we need to tell\nxfrm_policy_destroy() explicitly that the entry is not\nalive yet.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0f4bda005fd685f7cbb2ad47b7bab1b155df2b86",
      "tree": "65184615080e70e7fe4062451a11cabf42d44e26",
      "parents": [
        "f51f5ec6909fad9ddfcaa962377f7892d7918302"
      ],
      "author": {
        "name": "Paul Mundt",
        "email": "lethal@linux-sh.org",
        "time": "Thu Feb 14 14:48:45 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 14 14:48:45 2008 -0800"
      },
      "message": "net: xfrm statistics depend on INET\n\nnet/built-in.o: In function `xfrm_policy_init\u0027:\n/home/pmundt/devel/git/sh-2.6.25/net/xfrm/xfrm_policy.c:2338: undefined reference to `snmp_mib_init\u0027\n\nsnmp_mib_init() is only built in if CONFIG_INET is set.\n\nSigned-off-by: Paul Mundt \u003clethal@linux-sh.org\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b318e0e4ef4e85812c25afa19f75addccc834cd4",
      "tree": "95d51df1aa01978a99e763cd92fd6f7f4647bf20",
      "parents": [
        "45b503548210fe6f23e92b856421c2a3f05fd034"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Feb 12 22:50:35 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 12 22:50:35 2008 -0800"
      },
      "message": "[IPSEC]: Fix bogus usage of u64 on input sequence number\n\nAl Viro spotted a bogus use of u64 on the input sequence number which\nis big-endian.  This patch fixes it by giving the input sequence number\nits own member in the xfrm_skb_cb structure.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "405137d16fbe4c80b9e06e61af05856027745d23",
      "tree": "67c9540d5b7d968782b0d05d6a8cdee5f70afae9",
      "parents": [
        "054b0e2b2d5ed460784e8dfbf30ff4768dbf4376"
      ],
      "author": {
        "name": "Joy Latten",
        "email": "latten@austin.ibm.com",
        "time": "Thu Feb 07 23:11:56 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 07 23:11:56 2008 -0800"
      },
      "message": "[IPSEC]: Add support for aes-ctr.\n\nThe below patch allows IPsec to use CTR mode with AES encryption\nalgorithm. Tested this using setkey in ipsec-tools.\n\nSigned-off-by: Joy Latten \u003clatten@austin.ibm.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0c11b9428f619ab377c92eff2f160a834a6585dd",
      "tree": "35b573715ad5730a77d067486838345132771a7a",
      "parents": [
        "24e1c13c93cbdd05e4b7ea921c0050b036555adc"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Thu Jan 10 04:20:52 2008 -0500"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Fri Feb 01 14:04:59 2008 -0500"
      },
      "message": "[PATCH] switch audit_get_loginuid() to task_struct *\n\nall callers pass something-\u003eaudit_context\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "9472c9ef645d03ea823801d7716e658aeaf894e4",
      "tree": "349327bc0ea264312a2d753840e7c32590e4f6c8",
      "parents": [
        "5255dc6e14ce640ccb3e062362510a00ac59bbcd"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Thu Jan 31 17:14:58 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:28:30 2008 -0800"
      },
      "message": "[XFRM]: Fix statistics.\n\no Outbound sequence number overflow error status\n  is counted as XfrmOutStateSeqError.\no Additionaly, it changes inbound sequence number replay\n  error name from XfrmInSeqOutOfWindow to XfrmInStateSeqError\n  to apply name scheme above.\no Inbound IPv4 UDP encapsuling type mismatch error is wrongly\n  mapped to XfrmInStateInvalid then this patch fiex the error\n  to XfrmInStateMismatch.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5255dc6e14ce640ccb3e062362510a00ac59bbcd",
      "tree": "fe8799b5c48dcb2a39629f103e3053fffc113026",
      "parents": [
        "cc8fd14dcaad61be74cbd5879f27a76f91473a3f"
      ],
      "author": {
        "name": "Adrian Bunk",
        "email": "bunk@kernel.org",
        "time": "Thu Jan 31 17:10:30 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:28:29 2008 -0800"
      },
      "message": "[XFRM]: Remove unused exports.\n\nThis patch removes the following no longer used EXPORT_SYMBOL\u0027s:\n- xfrm_input.c: xfrm_parse_spi\n- xfrm_state.c: xfrm_replay_check\n- xfrm_state.c: xfrm_replay_advance\n\nSigned-off-by: Adrian Bunk \u003cbunk@kernel.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "533cb5b0a63f28ecab5503cfceb77e641fa7f7c4",
      "tree": "62e7d7c65776c5fb30a8ff10fb3049e63257331c",
      "parents": [
        "2216b48376c40cf6984398d478a01b55e76c5434"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Wed Jan 30 19:11:50 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:27:20 2008 -0800"
      },
      "message": "[XFRM]: constify \u0027struct xfrm_type\u0027\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1a6509d991225ad210de54c63314fd9542922095",
      "tree": "afe5c560388558bebd3e21b7c6f789a28a323a51",
      "parents": [
        "6fbf2cb77461a0cd0675228d20dd0f70d7b2251f"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Jan 28 19:37:29 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:27:03 2008 -0800"
      },
      "message": "[IPSEC]: Add support for combined mode algorithms\n\nThis patch adds support for combined mode algorithms with GCM being\nthe first algorithm supported.\n\nCombined mode algorithms can be added through the xfrm_user interface\nusing the new algorithm payload type XFRMA_ALG_AEAD.  Each algorithms\nis identified by its name and the ICV length.\n\nFor the purposes of matching algorithms in xfrm_tmpl structures,\ncombined mode algorithms occupy the same name space as encryption\nalgorithms.  This is in line with how they are negotiated using IKE.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6fbf2cb77461a0cd0675228d20dd0f70d7b2251f",
      "tree": "42f95202bb4095eaf9f498519d8ae63036214448",
      "parents": [
        "38320c70d282be1997a5204c7c7fe14c3aa6bfaa"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Jan 28 19:35:49 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:27:02 2008 -0800"
      },
      "message": "[IPSEC]: Allow async algorithms\n\nNow that ESP uses authenc we can turn on the support for async\nalgorithms in IPsec.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b7c6ba6eb1234e35a74fb8ba8123232a7b1ba9e4",
      "tree": "672c08c95229a6ac242ab12a5195dceddb0f3127",
      "parents": [
        "4f84d82f7a623f8641af2574425c329431ff158f"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Mon Jan 28 14:41:19 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:08:07 2008 -0800"
      },
      "message": "[NETNS]: Consolidate kernel netlink socket destruction.\n\nCreate a specific helper for netlink kernel socket disposal. This just\nlet the code look better and provides a ground for proper disposal\ninside a namespace.\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nTested-by: Alexey Dobriyan \u003cadobriyan@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1486cbd777316e55aa30aeb37e231ce618c29d2e",
      "tree": "f53c510b99b1d06bcecb396c6e11f75c56ca335c",
      "parents": [
        "cea14e0ed6082bd3dff19203d01340de6e7ca067"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Sat Jan 12 03:20:03 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:01:49 2008 -0800"
      },
      "message": "[XFRM] xfrm_policy: kill some bloat\n\nnet/xfrm/xfrm_policy.c:\n  xfrm_audit_policy_delete | -692\n  xfrm_audit_policy_add    | -692\n 2 functions changed, 1384 bytes removed, diff: -1384\n\nnet/xfrm/xfrm_policy.c:\n  xfrm_audit_common_policyinfo | +704\n 1 function changed, 704 bytes added, diff: +704\n\nnet/xfrm/xfrm_policy.o:\n 3 functions changed, 704 bytes added, 1384 bytes removed, diff: -680\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "50dd79653e295ce40da38c03bbfb5966aa1c1598",
      "tree": "c96cee5292a6d335978d578043a6c436d42e7ad3",
      "parents": [
        "06eaa1a01d033bd5fd298b010334034f93021fbe"
      ],
      "author": {
        "name": "Sebastian Siewior",
        "email": "sebastian@breakpoint.cc",
        "time": "Wed Jan 09 00:36:17 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:01:12 2008 -0800"
      },
      "message": "[XFRM]: Remove ifdef crypto.\n\nand select the crypto subsystem if neccessary\n\nSigned-off-by: Sebastian Siewior \u003csebastian@breakpoint.cc\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6666351df90656677723f8232b3fdd26a500e51e",
      "tree": "bdbc17a38c257153e9f70fed37cc06c643644648",
      "parents": [
        "40ccbf525e55fc6d1f3a88c1e98b13db4dd618db"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Tue Jan 08 01:35:52 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:49 2008 -0800"
      },
      "message": "[XFRM]: xfrm_state_clone() should be static, not exported\n\nxfrm_state_clone() is not used outside of net/xfrm/xfrm_state.c\nThere is no need to export it.\n\nSpoted by sparse checker.\n   CHECK   net/xfrm/xfrm_state.c\nnet/xfrm/xfrm_state.c:1103:19: warning: symbol \u0027xfrm_state_clone\u0027 was not\ndeclared. Should it be static?\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "64c31b3f76482bb64459e786f9eca3bd0164d153",
      "tree": "4f8fa9e23dbb2b2a73c4516263c983b01cff4f3a",
      "parents": [
        "d66e37a99d323012165ce91fd5c4518e2fcea0c5"
      ],
      "author": {
        "name": "WANG Cong",
        "email": "xiyou.wangcong@gmail.com",
        "time": "Mon Jan 07 22:34:29 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:46 2008 -0800"
      },
      "message": "[XFRM] xfrm_policy_destroy: Rename and relative fixes.\n\nSince __xfrm_policy_destroy is used to destory the resources\nallocated by xfrm_policy_alloc. So using the name\n__xfrm_policy_destroy is not correspond with xfrm_policy_alloc.\nRename it to xfrm_policy_destroy.\n\nAnd along with some instances that call xfrm_policy_alloc\nbut not using xfrm_policy_destroy to destroy the resource,\nfix them.\n\nSigned-off-by: WANG Cong \u003cxiyou.wangcong@gmail.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d66e37a99d323012165ce91fd5c4518e2fcea0c5",
      "tree": "8b4d420f207864ac65bcc5d4f5af1b3a8cde6cf2",
      "parents": [
        "a067d9ac39cd207b5a0994c73199a56e7d5a17a3"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Mon Jan 07 21:46:15 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:45 2008 -0800"
      },
      "message": "[XFRM] Statistics: Add outbound-dropping error.\n\no Increment PolError counter when flow_cache_lookup() returns\n  errored pointer.\n\no Increment NoStates counter at larval-drop.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cf35f43e6e41b160d8dedd80a127210fd3be9ada",
      "tree": "98489c87532e0d3014217fe756907339a4bd6285",
      "parents": [
        "ad1b30b1c282bc8c726a9b123a1312a3930bcd42"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Sat Jan 05 23:13:20 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:43 2008 -0800"
      },
      "message": "[XFRM]: Kill some bloat\n\nnet/xfrm/xfrm_state.c:\n  xfrm_audit_state_delete          | -589\n  xfrm_replay_check                | -542\n  xfrm_audit_state_icvfail         | -520\n  xfrm_audit_state_add             | -589\n  xfrm_audit_state_replay_overflow | -523\n  xfrm_audit_state_notfound_simple | -509\n  xfrm_audit_state_notfound        | -521\n 7 functions changed, 3793 bytes removed, diff: -3793\n\nnet/xfrm/xfrm_state.c:\n  xfrm_audit_helper_pktinfo | +522\n  xfrm_audit_helper_sainfo  | +598\n 2 functions changed, 1120 bytes added, diff: +1120\n\nnet/xfrm/xfrm_state.o:\n 9 functions changed, 1120 bytes added, 3793 bytes removed, diff: -2673\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "dbb1db8b59fb84d620ab5266366b52c8052ee75c",
      "tree": "3df775d08d9bf81494c184e2b6dc7390dbe0de54",
      "parents": [
        "9a429c4983deae020f1e757ecc8f547b6d4e2f2b"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Jan 01 23:52:59 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:32 2008 -0800"
      },
      "message": "[IPSEC]: Return EOVERFLOW when output sequence number overflows\n\nPreviously we made it an error on the output path if the sequence number\noverflowed.  However we did not set the err variable accordingly.  This\npatch sets err to -EOVERFLOW in that case.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9a429c4983deae020f1e757ecc8f547b6d4e2f2b",
      "tree": "172e27a5866e182b902cd77506df1755aafadb60",
      "parents": [
        "b950dfcf504842a0f2bb142a33ef938f1c00d300"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Tue Jan 01 21:58:02 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:31 2008 -0800"
      },
      "message": "[NET]: Add some acquires/releases sparse annotations.\n\nAdd __acquires() and __releases() annotations to suppress some sparse\nwarnings.\n\nexample of warnings :\n\nnet/ipv4/udp.c:1555:14: warning: context imbalance in \u0027udp_seq_start\u0027 - wrong\ncount at exit\nnet/ipv4/udp.c:1571:13: warning: context imbalance in \u0027udp_seq_stop\u0027 -\nunexpected unlock\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9dd3245a2ac1834797191072705015e6a12f55bf",
      "tree": "b8f05a146de3729698ef7627e68251ee68a2a472",
      "parents": [
        "0883ae0e5599656b5f3b0e9ce474e01dee7dfee4"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Dec 30 21:10:30 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:10 2008 -0800"
      },
      "message": "[IPSEC]: Move all calls to xfrm_audit_state_icvfail to xfrm_input\n\nLet\u0027s nip the code duplication in the bud :)\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fcb8c156c8277ee9d71c8c81587d494c9c5240b3",
      "tree": "49ee171a80205f7c8d9cd9ae4e02955b547d11e6",
      "parents": [
        "15ca36fb994923b454df44e5d7aa14b84ce5aee4"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Dec 30 21:09:38 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:09 2008 -0800"
      },
      "message": "[IPSEC]: Fix double free on skb on async output\n\nWhen the output transform returns EINPROGRESS due to async operation we\u0027ll\nfree the skb the straight away as if it were an error.  This patch fixes\nthat so that the skb is freed when the async operation completes.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b15c4bcd15741b31019379298edfca28dc78029d",
      "tree": "714ec07cf667fdc3ab2a8655e7f65f2ecb96ba2e",
      "parents": [
        "426b5303eb435d98b9bee37a807be386bc2b3320"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Mon Dec 24 16:00:09 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:04 2008 -0800"
      },
      "message": "[XFRM]: Fix outbound statistics.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e1af9f270b69a3ad1dcbabb404dd1f40a96f43f5",
      "tree": "8dc77b5c842a517d0d19bba835897846f77ec647",
      "parents": [
        "afeb14b49098ba7a51c96e083a4105a0301f94c4"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Fri Dec 21 14:59:08 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:02 2008 -0800"
      },
      "message": "[XFRM]: Drop packets when replay counter would overflow\n\nAccording to RFC4303, section 3.3.3 we need to drop outgoing packets which\ncause the replay counter to overflow:\n\n   3.3.3.  Sequence Number Generation\n\n   The sender\u0027s counter is initialized to 0 when an SA is established.\n   The sender increments the sequence number (or ESN) counter for this\n   SA and inserts the low-order 32 bits of the value into the Sequence\n   Number field.  Thus, the first packet sent using a given SA will\n   contain a sequence number of 1.\n\n   If anti-replay is enabled (the default), the sender checks to ensure\n   that the counter has not cycled before inserting the new value in the\n   Sequence Number field.  In other words, the sender MUST NOT send a\n   packet on an SA if doing so would cause the sequence number to cycle.\n   An attempt to transmit a packet that would result in sequence number\n   overflow is an auditable event.  The audit log entry for this event\n   SHOULD include the SPI value, current date/time, Source Address,\n   Destination Address, and (in IPv6) the cleartext Flow ID.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "afeb14b49098ba7a51c96e083a4105a0301f94c4",
      "tree": "2675451596adbea8aa261704c356d074136abbbd",
      "parents": [
        "dfd4f0ae2e111e2b93c295938c0e64ebbb69ae6e"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Fri Dec 21 14:58:11 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:01 2008 -0800"
      },
      "message": "[XFRM]: RFC4303 compliant auditing\n\nThis patch adds a number of new IPsec audit events to meet the auditing\nrequirements of RFC4303.  This includes audit hooks for the following events:\n\n * Could not find a valid SA [sections 2.1, 3.4.2]\n   . xfrm_audit_state_notfound()\n   . xfrm_audit_state_notfound_simple()\n\n * Sequence number overflow [section 3.3.3]\n   . xfrm_audit_state_replay_overflow()\n\n * Replayed packet [section 3.4.3]\n   . xfrm_audit_state_replay()\n\n * Integrity check failure [sections 3.4.4.1, 3.4.4.2]\n   . xfrm_audit_state_icvfail()\n\nWhile RFC4304 deals only with ESP most of the changes in this patch apply to\nIPsec in general, i.e. both AH and ESP.  The one case, integrity check\nfailure, where ESP specific code had to be modified the same was done to the\nAH code for the sake of consistency.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "68277accb3a5f004344f4346498640601b8b7016",
      "tree": "e6b541283a516406fbd936051028845a20f5a7c4",
      "parents": [
        "8ea843495df36036cb7f22f61994b34f8362b443"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Thu Dec 20 20:49:33 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:40 2008 -0800"
      },
      "message": "[XFRM]: Assorted IPsec fixups\n\nThis patch fixes a number of small but potentially troublesome things in the\nXFRM/IPsec code:\n\n * Use the \u0027audit_enabled\u0027 variable already in include/linux/audit.h\n   Removed the need for extern declarations local to each XFRM audit fuction\n\n * Convert \u0027sid\u0027 to \u0027secid\u0027 everywhere we can\n   The \u0027sid\u0027 name is specific to SELinux, \u0027secid\u0027 is the common naming\n   convention used by the kernel when refering to tokenized LSM labels,\n   unfortunately we have to leave \u0027ctx_sid\u0027 in \u0027struct xfrm_sec_ctx\u0027 otherwise\n   we risk breaking userspace\n\n * Convert address display to use standard NIP* macros\n   Similar to what was recently done with the SPD audit code, this also also\n   includes the removal of some unnecessary memcpy() calls\n\n * Move common code to xfrm_audit_common_stateinfo()\n   Code consolidation from the \"less is more\" book on software development\n\n * Proper spacing around commas in function arguments\n   Minor style tweak since I was already touching the code\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8ea843495df36036cb7f22f61994b34f8362b443",
      "tree": "0038a215ddaedf1eab19969636a95ebc9ecb6694",
      "parents": [
        "0aa647746e5602e608220c10e51f49709a030f5d"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Thu Dec 20 20:44:02 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:39 2008 -0800"
      },
      "message": "[XFRM]: Add packet processing statistics option.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0aa647746e5602e608220c10e51f49709a030f5d",
      "tree": "514cde2ddf6308b0f1dfd83039cb8dd62b2c69d2",
      "parents": [
        "558f82ef6e0d25e87f7468c07b6db1fbbf95a855"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Thu Dec 20 20:43:36 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:39 2008 -0800"
      },
      "message": "[XFRM]: Support to increment packet dropping statistics.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "558f82ef6e0d25e87f7468c07b6db1fbbf95a855",
      "tree": "b2fe20926ca4e500b6e5c0232a5bf3b2e3ba898e",
      "parents": [
        "9473e1f631de339c50bde1e3bd09e1045fe90fd5"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Thu Dec 20 20:42:57 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:38 2008 -0800"
      },
      "message": "[XFRM]: Define packet dropping statistics.\n\nThis statistics is shown factor dropped by transformation\nat /proc/net/xfrm_stat for developer.\nIt is a counter designed from current transformation source code\nand defined as linux private MIB.\n\nSee Documentation/networking/xfrm_proc.txt for the detail.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a1b051405bc16222d92c73b0c26d65b333a154ee",
      "tree": "2950e34bbb51838f8da3e1d03c8ee608d3b56f55",
      "parents": [
        "bd515c3e48ececd774eb3128e81b669dbbd32637"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Thu Dec 20 20:41:12 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:36 2008 -0800"
      },
      "message": "[XFRM] IPv6: Fix dst/routing check at transformation.\n\nIPv6 specific thing is wrongly removed from transformation at net-2.6.25.\nThis patch recovers it with current design.\n\no Update \"path\" of xfrm_dst since IPv6 transformation should\n  care about routing changes. It is required by MIPv6 and\n  off-link destined IPsec.\no Rename nfheader_len which is for non-fragment transformation used by\n  MIPv6 to rt6i_nfheader_len as IPv6 name space.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "910ef70aa301eb018255683499b8e51426c213a0",
      "tree": "ccde31a2c581c1f9ddea0c482f22ce72a9293f0e",
      "parents": [
        "33b8e776056202aceaf4c90f465d0f4ee53432ac"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Dec 18 22:14:25 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:13 2008 -0800"
      },
      "message": "[IPSEC]: Do xfrm_state_check_space before encapsulation\n\nWhile merging the IPsec output path I moved the encapsulation output\noperation to the top of the loop so that it sits outside of the locked\nsection.  Unfortunately in doing so it now sits in front of the space\ncheck as well which could be a fatal error.\n\nThis patch rearranges the calls so that the space check happens as\nthe thing on the output path.\n\nThis patch also fixes an incorrect goto should the encapsulation output\nfail.\n\nThanks to Kazunori MIYAZAWA for finding this bug.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4bda4f250d21c3e4f2a2da5f4cef829a434a4046",
      "tree": "2632bc368ceab622cf119ef5aee154617fe43f1c",
      "parents": [
        "5e41fb83216d370d158fe17675af82d12c6c72c9"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Fri Dec 14 11:38:04 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:58:07 2008 -0800"
      },
      "message": "[XFRM]: Fix potential race vs xfrm_state(only)_find and xfrm_hash_resize.\n\nThe _find calls calculate the hash value using the\nxfrm_state_hmask, without the xfrm_state_lock. But the\nvalue of this mask can change in the _resize call under\nthe state_lock, so we risk to fail in finding the desired\nentry in hash.\n\nI think, that the hash value is better to calculate\nunder the state lock.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "aef21785995778f710a60b563e03bf53ba455a47",
      "tree": "5deeca8578e5b8d0198144b9dc2b281f8789a3df",
      "parents": [
        "cf86314cb7460423b0b7e611edad80a52dc90d10"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Dec 13 09:30:59 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:54 2008 -0800"
      },
      "message": "[IPSEC]: Fix zero return value in xfrm_lookup on error\n\nFurther testing shows that my ICMP relookup patch can cause xfrm_lookup\nto return zero on error which isn\u0027t very nice since it leads to the caller\ndying on null pointer dereference.  The bug is due to not setting err\nto ENOENT just before we leave xfrm_lookup in case of no policy.\n\nThis patch moves the err setting to where it should be.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8b7817f3a959ed99d7443afc12f78a7e1fcc2063",
      "tree": "7e315dfbf5c77e67f6e7ad56f14eaddca621212b",
      "parents": [
        "d5422efe680fc55010c6ddca2370ca9548a96355"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Dec 12 10:44:43 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:23 2008 -0800"
      },
      "message": "[IPSEC]: Add ICMP host relookup support\n\nRFC 4301 requires us to relookup ICMP traffic that does not match any\npolicies using the reverse of its payload.  This patch implements this\nfor ICMP traffic that originates from or terminates on localhost.\n\nThis is activated on outbound with the new policy flag XFRM_POLICY_ICMP,\nand on inbound by the new state flag XFRM_STATE_ICMP.\n\nOn inbound the policy check is now performed by the ICMP protocol so\nthat it can repeat the policy check where necessary.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d5422efe680fc55010c6ddca2370ca9548a96355",
      "tree": "f72fa5eb779c8ae7d49688a9caac9b69a1f3bd58",
      "parents": [
        "815f4e57e9fc67456624ecde0515a901368c78d2"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Dec 12 10:44:16 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:22 2008 -0800"
      },
      "message": "[IPSEC]: Added xfrm_decode_session_reverse and xfrmX_policy_check_reverse\n\nRFC 4301 requires us to relookup ICMP traffic that does not match any\npolicies using the reverse of its payload.  This patch adds the functions\nxfrm_decode_session_reverse and xfrmX_policy_check_reverse so we can get\nthe reverse flow to perform such a lookup.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "815f4e57e9fc67456624ecde0515a901368c78d2",
      "tree": "a93d4c3922d9711a6d29d909c8d79694c931e2a4",
      "parents": [
        "3f71c81ac37b27b824e9ce18fe17438dc2af4a16"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Dec 12 10:36:59 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:21 2008 -0800"
      },
      "message": "[IPSEC]: Make xfrm_lookup flags argument a bit-field\n\nThis patch introduces an enum for bits in the flags argument of xfrm_lookup.\nThis is so that we can cram more information into it later.\n\nSince all current users use just the values 0 and 1, XFRM_LOOKUP_WAIT has\nbeen added with the value 1 \u003c\u003c 0 to represent the current meaning of flags.\n\nThe test in __xfrm_lookup has been changed accordingly.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "005011211f559113686938c2c252b8ee1ab855b5",
      "tree": "a126bc8cbbfa9a263e06cc517fe3c1ae6f31af59",
      "parents": [
        "385ac2e3f226c09cb71733df1899658e33a7850f"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Dec 11 01:53:43 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:05 2008 -0800"
      },
      "message": "[IPSEC]: Add xfrm_input_state helper\n\nThis patch adds the xfrm_input_state helper function which returns the\ncurrent xfrm state being processed on the input path given an sk_buff.\nThis is currently only used by xfrm_input but will be used by ESP upon\nasynchronous resumption.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "df01812eba19834e48abd43246abedfbc4feeb7e",
      "tree": "c178f29cca560d9549a1e1a7270b2d532316b058",
      "parents": [
        "0e3cf7e9164048b79e7375bd66c9ef350e5b5bd7"
      ],
      "author": {
        "name": "Denis Cheng",
        "email": "crquan@gmail.com",
        "time": "Fri Dec 07 00:51:11 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:56:54 2008 -0800"
      },
      "message": "[XFRM] net/xfrm/xfrm_state.c: use LIST_HEAD instead of LIST_HEAD_INIT\n\nsingle list_head variable initialized with LIST_HEAD_INIT could almost\nalways can be replaced with LIST_HEAD declaration, this shrinks the code\nand looks better.\n\nSigned-off-by: Denis Cheng \u003ccrquan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5a3e55d68ec5baac578bf32ba67607088c763657",
      "tree": "9e8f9dfae66c8a85735122ece8a9c85cdb5c31c4",
      "parents": [
        "b84a2189c4e1835c51fd6b974a0497be9bc4ba87"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Fri Dec 07 00:38:10 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:56:44 2008 -0800"
      },
      "message": "[NET]: Multiple namespaces in the all dst_ifdown routines.\n\nMove dst entries to a namespace loopback to catch refcounting leaks.\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2fcb45b6b87914f072314e5b5d9c196f45984683",
      "tree": "e5a6cc4101a8b2693799fde9f47abaf480ae2dfc",
      "parents": [
        "bbca17680f82b1ba3122d41e8bc675aebf6d1cf2"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Dec 03 22:54:12 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:55:49 2008 -0800"
      },
      "message": "[IPSEC]: Use the correct family for input state lookup\n\nWhen merging the input paths of IPsec I accidentally left a hard-coded\nAF_INET for the state lookup call.  This broke IPv6 obviously.  This\npatch fixes by getting the input callers to specify the family through\nskb-\u003ecb.\n\nCredit goes to Kazunori Miyazawa for diagnosing this and providing an\ninitial patch.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "875179fa60ffe2eba1daaefb0af1be97ff5eda6a",
      "tree": "cc691e83f8dc2e022299362da49673fb31c2de55",
      "parents": [
        "9108d5f4b2cd82f55ad178caa0be66a866a06dcc"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Sat Dec 01 23:27:18 2007 +1100"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:55:19 2008 -0800"
      },
      "message": "[IPSEC]: SPD auditing fix to include the netmask/prefix-length\n\nCurrently the netmask/prefix-length of an IPsec SPD entry is not included in\nany of the SPD related audit messages.  This can cause a problem when the\naudit log is examined as the netmask/prefix-length is vital in determining\nwhat network traffic is affected by a particular SPD entry.  This patch fixes\nthis problem by adding two additional fields, \"src_prefixlen\" and\n\"dst_prefixlen\", to the SPD audit messages to indicate the source and\ndestination netmasks.  These new fields are only included in the audit message\nwhen the netmask/prefix-length is less than the address length, i.e. the SPD\nentry applies to a network address and not a host address.\n\nExample audit message:\n\n type\u003dUNKNOWN[1415] msg\u003daudit(1196105849.752:25): auid\u003d0 \\\n   subj\u003droot:system_r:unconfined_t:s0-s0:c0.c1023 op\u003dSPD-add res\u003d1 \\\n   src\u003d192.168.0.0 src_prefixlen\u003d24 dst\u003d192.168.1.0 dst_prefixlen\u003d24\n\nIn addition, this patch also fixes a few other things in the\nxfrm_audit_common_policyinfo() function.  The IPv4 string formatting was\nconverted to use the standard NIPQUAD_FMT constant, the memcpy() was removed\nfrom the IPv6 code path and replaced with a typecast (the memcpy() was acting\nas a slow, implicit typecast anyway), and two local variables were created to\nmake referencing the XFRM security context and selector information cleaner.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "dcaee95a1b396f85cdc28099f39710be328d3a5e",
      "tree": "2408c1ad351b4a12c2ab2423cd854cc67f4f4da8",
      "parents": [
        "8512430e554a84275669f78f86dce18566d5cf7a"
      ],
      "author": {
        "name": "Joonwoo Park",
        "email": "joonwpark81@gmail.com",
        "time": "Mon Nov 26 23:23:21 2007 +0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:55:05 2008 -0800"
      },
      "message": "[IPSEC]: kmalloc + memset conversion to kzalloc\n\n2007/11/26, Patrick McHardy \u003ckaber@trash.net\u003e:\n\u003e How about also switching vmalloc/get_free_pages to GFP_ZERO\n\u003e and getting rid of the memset entirely while you\u0027re at it?\n\u003e\n\nxfrm_hash: kmalloc + memset conversion to kzalloc\nfix to avoid memset entirely.\n\nSigned-off-by: Joonwoo Park \u003cjoonwpark81@gmail.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "294b4baf292197e13d1df1d253efa7ac84ffee3f",
      "tree": "f7f4fc0fa51e937829e2702faffa78b913895f99",
      "parents": [
        "6e23ae2a48750bda407a4a58f52a4865d7308bf5"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Nov 14 01:57:47 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:55 2008 -0800"
      },
      "message": "[IPSEC]: Kill afinfo-\u003enf_post_routing\n\nAfter changeset:\n\n\t[NETFILTER]: Introduce NF_INET_ hook values\n\nIt always evaluates to NF_INET_POST_ROUTING.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1bf06cd2e338fd6fc29169d30eaf0df982338285",
      "tree": "351bf1c8e5063fdfb8c820470972169d398729fe",
      "parents": [
        "60d5fcfb19d8a958fc563e52240cd05ec23f36c9"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 19 18:50:17 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:54 2008 -0800"
      },
      "message": "[IPSEC]: Add async resume support on input\n\nThis patch adds support for async resumptions on input.  To do so, the\ntransform would return -EINPROGRESS and subsequently invoke the\nfunction xfrm_input_resume to resume processing.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "60d5fcfb19d8a958fc563e52240cd05ec23f36c9",
      "tree": "f1bb64a18b1b183ad1cdf84f88a42a0b643af720",
      "parents": [
        "d26f398400311982d2433debae85746c348b7d58"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 19 18:47:58 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:53 2008 -0800"
      },
      "message": "[IPSEC]: Remove nhoff from xfrm_input\n\nThe nhoff field isn\u0027t actually necessary in xfrm_input.  For tunnel\nmode transforms we now throw away the output IP header so it makes no\nsense to fill in the nexthdr field.  For transport mode we can now let\nthe function transport_finish do the setting and it knows where the\nnexthdr field is.\n\nThe only other thing that needs the nexthdr field to be set is the\nheader extraction code.  However, we can simply move the protocol\nextraction out of the generic header extraction.\n\nWe want to minimise the amount of info we have to carry around between\ntransforms as this simplifies the resumption process for async crypto.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d26f398400311982d2433debae85746c348b7d58",
      "tree": "cd1fd0dfbd5a51428dc92ea3dbbb864205a27fa8",
      "parents": [
        "0ebea8ef3559b545c37b016f44e84c3b33e47c39"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:47:08 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:52 2008 -0800"
      },
      "message": "[IPSEC]: Make x-\u003elastused an unsigned long\n\nCurrently x-\u003elastused is u64 which means that it cannot be\nread/written atomically on all architectures.  David Miller observed\nthat the value stored in it is only an unsigned long which is always\natomic.\n\nSo based on his suggestion this patch changes the internal\nrepresentation from u64 to unsigned long while the user-interface\nstill refers to it as u64.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0ebea8ef3559b545c37b016f44e84c3b33e47c39",
      "tree": "7a47787c1b830084ac2d36371490b9e2574e2472",
      "parents": [
        "668dc8af3150f837f7f0461001bbbc0ce25d7bdf"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:45:58 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:52 2008 -0800"
      },
      "message": "[IPSEC]: Move state lock into x-\u003etype-\u003einput\n\nThis patch releases the lock on the state before calling\nx-\u003etype-\u003einput.  It also adds the lock to the spots where they\u0027re\ncurrently needed.\n\nMost of those places (all except mip6) are expected to disappear with\nasync crypto.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "668dc8af3150f837f7f0461001bbbc0ce25d7bdf",
      "tree": "9ba3534a190bb69b3aebf24aaa4340685fe16539",
      "parents": [
        "b2aa5e9d43a38dcdfa0878ed750cf32f98460278"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Dec 16 15:55:02 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:51 2008 -0800"
      },
      "message": "[IPSEC]: Move integrity stat collection into xfrm_input\n\nSimilar to the moving out of the replay processing on the output, this\npatch moves the integrity stat collectin from x-\u003etype-\u003einput into\nxfrm_input.\n\nThis would eventually allow transforms such as AH/ESP to be lockless.\n\nThe error value EBADMSG (currently unused in the crypto layer) is used\nto indicate a failed integrity check.  In future this error can be\ndirectly returned by the crypto layer once we switch to aead\nalgorithms.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b2aa5e9d43a38dcdfa0878ed750cf32f98460278",
      "tree": "e00544bd1aa0ab6e2ccb0696e1a89cd4900130e9",
      "parents": [
        "716062fd4c2f88a33ab409f62a1e7397ad0a7e33"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:44:55 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:50 2008 -0800"
      },
      "message": "[IPSEC]: Store xfrm states in security path directly\n\nAs it is xfrm_input first collects a list of xfrm states on the stack\nbefore storing them in the packet\u0027s security path just before it\nreturns.  For async crypto, this construction presents an obstacle\nsince we may need to leave the loop after each transform.\n\nIn fact, it\u0027s much easier to just skip the stack completely and always\nstore to the security path.  This is proven by the fact that this\npatch actually shrinks the code.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "716062fd4c2f88a33ab409f62a1e7397ad0a7e33",
      "tree": "73f2618fe99bca3870a0dbdc35acf6466ab3b976",
      "parents": [
        "c6581a457e661b7070e484ad723bbf555b17aca2"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:44:23 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:50 2008 -0800"
      },
      "message": "[IPSEC]: Merge most of the input path\n\nAs part of the work on asynchronous cryptographic operations, we need\nto be able to resume from the spot where they occur.  As such, it\nhelps if we isolate them to one spot.\n\nThis patch moves most of the remaining family-specific processing into\nthe common input code.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c6581a457e661b7070e484ad723bbf555b17aca2",
      "tree": "8562bded99fdee996e6b147d938057caf154f25b",
      "parents": [
        "862b82c6f960cc61274d370aa78ce1112f92a83e"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:43:43 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:49 2008 -0800"
      },
      "message": "[IPSEC]: Add async resume support on output\n\nThis patch adds support for async resumptions on output.  To do so,\nthe transform would return -EINPROGRESS and subsequently invoke the\nfunction xfrm_output_resume to resume processing.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "862b82c6f960cc61274d370aa78ce1112f92a83e",
      "tree": "51e252e1525dd7d02a695d428890a4c37fae2442",
      "parents": [
        "ef76bc23ef2acf20c8f7f841a542d8ab74c827c6"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:43:11 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:48 2008 -0800"
      },
      "message": "[IPSEC]: Merge most of the output path\n\nAs part of the work on asynchrnous cryptographic operations, we need\nto be able to resume from the spot where they occur.  As such, it\nhelps if we isolate them to one spot.\n\nThis patch moves most of the remaining family-specific processing into\nthe common output code.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "227620e295090629fcb2c46ad3828222ab65438d",
      "tree": "534162a74628fdfa7a8201cb776a45ca07510e5b",
      "parents": [
        "36cf9acf93e8561d9faec24849e57688a81eb9c5"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:41:28 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:46 2008 -0800"
      },
      "message": "[IPSEC]: Separate inner/outer mode processing on input\n\nWith inter-family transforms the inner mode differs from the outer\nmode.  Attempting to handle both sides from the same function means\nthat it needs to handle both IPv4 and IPv6 which creates duplication\nand confusion.\n\nThis patch separates the two parts on the input path so that each\nfunction deals with one family only.\n\nIn particular, the functions xfrm4_extract_inut/xfrm6_extract_inut\nmoves the pertinent fields from the IPv4/IPv6 IP headers into a\nneutral format stored in skb-\u003ecb.  This is then used by the inner mode\ninput functions to modify the inner IP header.  In this way the input\nfunction no longer has to know about the outer address family.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a2deb6d26f16ed7bf787dbd6a58c5d7be47d8db3",
      "tree": "a8c1ef4007cd8d419aa8d8a218092b00dcd64757",
      "parents": [
        "e40b3286158565909692e5914ea4a11bdbcc68c8"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:39:38 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:44 2008 -0800"
      },
      "message": "[IPSEC]: Move x-\u003eouter_mode-\u003eoutput out of locked section\n\nRO mode is the only one that requires a locked output function.  So\nit\u0027s easier to move the lock into that function rather than requiring\neveryone else to run under the lock.\n\nIn particular, this allows us to move the size check into the output\nfunction without causing a potential dead-lock should the ICMP error\nsomehow hit the same SA on transmission.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "25ee3286dcbc830a833354bb1d15567956844813",
      "tree": "bb5597d9e148f363bf0bbcd1a7269b5f677f0103",
      "parents": [
        "66cdb3ca27323a92712d289fc5edc7841d74a139"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Dec 11 09:32:34 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:43 2008 -0800"
      },
      "message": "[IPSEC]: Merge common code into xfrm_bundle_create\n\nHalf of the code in xfrm4_bundle_create and xfrm6_bundle_create are\ncommon.  This patch extracts that logic and puts it into\nxfrm_bundle_create.  The rest of it are then accessed through afinfo.\n\nAs a result this fixes the problem with inter-family transforms where\nwe treat every xfrm dst in the bundle as if it belongs to the top\nfamily.\n\nThis patch also fixes a long-standing error-path bug where we may free\nthe xfrm states twice.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "66cdb3ca27323a92712d289fc5edc7841d74a139",
      "tree": "443c864e4cab413743c3ca755a50f8a5d0ec300d",
      "parents": [
        "f04e7e8d7f175c05bbde3ae748bf2541da53721d"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:37:28 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:42 2008 -0800"
      },
      "message": "[IPSEC]: Move flow construction into xfrm_dst_lookup\n\nThis patch moves the flow construction from the callers of\nxfrm_dst_lookup into that function.  It also changes xfrm_dst_lookup\nso that it takes an xfrm state as its argument instead of explicit\naddresses.\n\nThis removes any address-specific logic from the callers of\nxfrm_dst_lookup which is needed to correctly support inter-family\ntransforms.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "550ade8432a2a6fbfb48ba7018750b0e8c81e8d0",
      "tree": "092838fb75d0352858dc473f32a78d1bc1db05f3",
      "parents": [
        "0148894223740da4818d7f4e6f92cbb5481a25b8"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:33:01 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:36 2008 -0800"
      },
      "message": "[IPSEC]: Use dst-\u003eheader_len when resizing on output\n\nCurrently we use x-\u003eprops.header_len when resizing on output.\nHowever, if we\u0027re resizing at all we might as well go the whole hog\nand do it for the whole dst.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b24b8a247ff65c01b252025926fe564209fae4fc",
      "tree": "8a9e0ea1e24b4733d8b9433d41877659505e9da4",
      "parents": [
        "a92aa318b4b369091fd80433c80e62838db8bc1c"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Wed Jan 23 21:20:07 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:35 2008 -0800"
      },
      "message": "[NET]: Convert init_timer into setup_timer\n\nMany-many code in the kernel initialized the timer-\u003efunction\nand  timer-\u003edata together with calling init_timer(timer). There\nis already a helper for this. Use it for networking code.\n\nThe patch is HUGE, but makes the code 130 lines shorter\n(98 insertions(+), 228 deletions(-)).\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nAcked-by: Arnaldo Carvalho de Melo \u003cacme@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0f99be0d115a5716292c58dfdb20d2eddd0f3387",
      "tree": "a4c8fc6262add152fa7207e40a5f02b18c9bedde",
      "parents": [
        "2e3884b5b16795c03a7bf295797c1b2402885b88"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Tue Jan 08 23:39:06 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jan 08 23:39:06 2008 -0800"
      },
      "message": "[XFRM]: xfrm_algo_clone() allocates too much memory\n\nalg_key_len is the length in bits of the key, not in bytes.\n\nBest way to fix this is to move alg_len() function from net/xfrm/xfrm_user.c \nto include/net/xfrm.h, and to use it in xfrm_algo_clone()\n\nalg_len() is renamed to xfrm_alg_len() because of its global exposition.\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2d60abc2a937bf77575c3b8c83faeeb84a84e654",
      "tree": "ecabc0dd8bacbb1d3152251cdc1ac8274c7aed24",
      "parents": [
        "76975f8a3186dae501584d0155ea410464f62815"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Thu Jan 03 20:43:21 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jan 04 00:47:03 2008 -0800"
      },
      "message": "[XFRM]: Do not define km_migrate() if !CONFIG_XFRM_MIGRATE\n\nIn include/net/xfrm.h we find :\n\n#ifdef CONFIG_XFRM_MIGRATE\nextern int km_migrate(struct xfrm_selector *sel, u8 dir, u8 type,\n                      struct xfrm_migrate *m, int num_bundles);\n...\n#endif\n\nWe can also guard the function body itself in net/xfrm/xfrm_state.c\nwith same condition.\n\n(Problem spoted by sparse checker)\nmake C\u003d2 net/xfrm/xfrm_state.o\n...\nnet/xfrm/xfrm_state.c:1765:5: warning: symbol \u0027km_migrate\u0027 was not declared. Should it be static?\n...\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5951cab136d8b7e84696061dc2e69c402bc94f61",
      "tree": "c00828fa48d9d02f992da23619feaafef41498bb",
      "parents": [
        "f398035f2dec0a6150833b0bc105057953594edb"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Thu Dec 20 00:00:45 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 20 00:00:45 2007 -0800"
      },
      "message": "[XFRM]: Audit function arguments misordered\n\nIn several places the arguments to the xfrm_audit_start() function are\nin the wrong order resulting in incorrect user information being\nreported.  This patch corrects this by pacing the arguments in the\ncorrect order.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9ab4c954ce2b2b3c485bee7e425fda05946893be",
      "tree": "111c1cd3b765d06fd42325b1904a2289297142a8",
      "parents": [
        "a18aa31b7774d8b36048e256a02d9d689533fc96"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Wed Dec 12 11:10:16 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 14 13:54:35 2007 -0800"
      },
      "message": "[XFRM]: Display the audited SPI value in host byte order.\n\nCurrently the IPsec protocol SPI values are written to the audit log in\nnetwork byte order which is different from almost all other values which\nare recorded in host byte order.  This patch corrects this inconsistency\nby writing the SPI values to the audit record in host byte order.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "75b8c133267053c9986a7c8db5131f0e7349e806",
      "tree": "264a44a1882196c894f1af84baf7fbba7698678c",
      "parents": [
        "3f03e387893ffa07a4d5dac96772f9db3221a185"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Dec 11 04:38:08 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Dec 11 04:38:08 2007 -0800"
      },
      "message": "[IPSEC]: Fix potential dst leak in xfrm_lookup\n\nIf we get an error during the actual policy lookup we don\u0027t free the\noriginal dst while the caller expects us to always free the original\ndst in case of error.\n\nThis patch fixes that.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5e5234ff17ef98932688116025b30958bd28a940",
      "tree": "c14918fe21d01eeda770856aff55dc2363fd69a2",
      "parents": [
        "076931989fe96823a577259cc6bc205d7ec31754"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 00:50:31 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 00:50:31 2007 +1100"
      },
      "message": "[IPSEC]: Fix uninitialised dst warning in __xfrm_lookup\n\nAndrew Morton reported that __xfrm_lookup generates this warning:\n\nnet/xfrm/xfrm_policy.c: In function \u0027__xfrm_lookup\u0027:\nnet/xfrm/xfrm_policy.c:1449: warning: \u0027dst\u0027 may be used uninitialized in this function\n\nThis is because if policy-\u003eaction is of an unexpected value then dst will\nnot be initialised.  Of course, in practice this should never happen since\nthe input layer xfrm_user/af_key will filter out all illegal values.  But\nthe compiler doesn\u0027t know that of course.\n\nSo this patch fixes this by taking the conservative approach and treat all\nunknown actions the same as a blocking action.\n\nThanks to Andrew for finding this and providing an initial fix.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "5dba4797115c8fa05c1a4d12927a6ae0b33ffc41",
      "tree": "6f515e0e29352ff06887ceb272e106e87966f709",
      "parents": [
        "8a8037ac9dbe4eb20ce50aa20244faf77444f4a3"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue Nov 27 11:10:07 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 27 11:10:07 2007 +0800"
      },
      "message": "[XFRM]: Fix leak of expired xfrm_states\n\nThe xfrm_timer calls __xfrm_state_delete, which drops the final reference\nmanually without triggering destruction of the state. Change it to use\nxfrm_state_put to add the state to the gc list when we\u0027re dropping the\nlast reference. The timer function may still continue to use the state\nsafely since the final destruction does a del_timer_sync().\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "8053fc3de720e1027d690f892ff7d7c1737fdd9d",
      "tree": "0437efa29587beb5ebb174c402f7954cfde2269a",
      "parents": [
        "7f9c33e515353ea91afc62341161fead19e78567"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 26 19:07:34 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 26 19:07:34 2007 +0800"
      },
      "message": "[IPSEC]: Temporarily remove locks around copying of non-atomic fields\n\nThe change 050f009e16f908932070313c1745d09dc69fd62b\n\n\t[IPSEC]: Lock state when copying non-atomic fields to user-space\n\ncaused a regression.\n\nIngo Molnar reports that it causes a potential dead-lock found by the\nlock validator as it tries to take x-\u003elock within xfrm_state_lock while\nnumerous other sites take the locks in opposite order.\n\nFor 2.6.24, the best fix is to simply remove the added locks as that puts\nus back in the same state as we\u0027ve been in for years.  For later kernels\na proper fix would be to reverse the locking order for every xfrm state\nuser such that if x-\u003elock is taken together with xfrm_state_lock then\nit is to be taken within it.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "87ae9afdcada236d0a1b38ce2c465a65916961dc",
      "tree": "c885e589ff66daf4f860b19818228edb75b29530",
      "parents": [
        "013fb33972061ac65cdf3e1771267985e59deca1"
      ],
      "author": {
        "name": "Adrian Bunk",
        "email": "bunk@kernel.org",
        "time": "Tue Oct 30 10:35:04 2007 +0100"
      },
      "committer": {
        "name": "Jens Axboe",
        "email": "axboe@carl.home.kernel.dk",
        "time": "Fri Nov 02 08:47:06 2007 +0100"
      },
      "message": "cleanup asm/scatterlist.h includes\n\nNot architecture specific code should not #include \u003casm/scatterlist.h\u003e.\n\nThis patch therefore either replaces them with\n#include \u003clinux/scatterlist.h\u003e or simply removes them if they were\nunused.\n\nSigned-off-by: Adrian Bunk \u003cbunk@kernel.org\u003e\nSigned-off-by: Jens Axboe \u003cjens.axboe@oracle.com\u003e\n"
    },
    {
      "commit": "0e0940d4bb9b19c0a45c844a83e1d25686aaf433",
      "tree": "1644f6c36efe10a6e90f5e395d80564f8a9ba860",
      "parents": [
        "ed0e7e0ca370519d6f79d1093ee2890d4cdee744"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Oct 26 00:39:27 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Oct 26 00:39:27 2007 -0700"
      },
      "message": "[IPSEC]: Fix scatterlist handling in skb_icv_walk().\n\nUse sg_init_one() and sg_init_table() as needed.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "642f149031d70415d9318b919d50b71e4724adbd",
      "tree": "e792ad29dedffc6756d55e9d63e18ada35515b4b",
      "parents": [
        "bd6dee6f30a0f6943df190b387b5f8fe98a848f3"
      ],
      "author": {
        "name": "Jens Axboe",
        "email": "jens.axboe@oracle.com",
        "time": "Wed Oct 24 11:20:47 2007 +0200"
      },
      "committer": {
        "name": "Jens Axboe",
        "email": "jens.axboe@oracle.com",
        "time": "Wed Oct 24 11:20:47 2007 +0200"
      },
      "message": "SG: Change sg_set_page() to take length and offset argument\n\nMost drivers need to set length and offset as well, so may as well fold\nthose three lines into one.\n\nAdd sg_assign_page() for those two locations that only needed to set\nthe page, where the offset/length is set outside of the function context.\n\nSigned-off-by: Jens Axboe \u003cjens.axboe@oracle.com\u003e\n"
    },
    {
      "commit": "b3b724f48c0c0ade1d5120744cc5c9a3e5193d08",
      "tree": "5f95a2acc5f1d1a25ce3d39af56ec38453fe783a",
      "parents": [
        "7aeacf982203fb4dea2f3434eefdc268cfd5d6d9"
      ],
      "author": {
        "name": "Heiko Carstens",
        "email": "heiko.carstens@de.ibm.com",
        "time": "Tue Oct 23 09:28:34 2007 +0200"
      },
      "committer": {
        "name": "Jens Axboe",
        "email": "jens.axboe@oracle.com",
        "time": "Tue Oct 23 09:49:27 2007 +0200"
      },
      "message": "net: fix xfrm build - missing scatterlist.h include\n\nnet/xfrm/xfrm_algo.c: In function \u0027skb_icv_walk\u0027:\nnet/xfrm/xfrm_algo.c:555: error: implicit declaration of function\n\u0027sg_set_page\u0027\nmake[2]: *** [net/xfrm/xfrm_algo.o] Error 1\n\nCc: David Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Heiko Carstens \u003cheiko.carstens@de.ibm.com\u003e\nSigned-off-by: Jens Axboe \u003cjens.axboe@oracle.com\u003e\n"
    },
    {
      "commit": "fa05f1286be25a8ce915c5dd492aea61126b3f33",
      "tree": "07d6d32733f3272d588410a64c0cfa25d794e3be",
      "parents": [
        "60c74f81933635bb4ccb4ee6f31909c51f5cd230"
      ],
      "author": {
        "name": "Jens Axboe",
        "email": "jens.axboe@oracle.com",
        "time": "Mon Oct 22 19:44:26 2007 +0200"
      },
      "committer": {
        "name": "Jens Axboe",
        "email": "jens.axboe@oracle.com",
        "time": "Mon Oct 22 21:19:56 2007 +0200"
      },
      "message": "Update net/ to use sg helpers\n\nSigned-off-by: Jens Axboe \u003cjens.axboe@oracle.com\u003e\n"
    },
    {
      "commit": "13996378e6585fb25e582afe7489bf52dde78deb",
      "tree": "4a1eb75c81a5a9d23c68f9818259f3b357dc8265",
      "parents": [
        "ca68145f16359f71cd62b2671aa3e8c58f45ef19"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Oct 17 21:35:51 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 17 21:35:51 2007 -0700"
      },
      "message": "[IPSEC]: Rename mode to outer_mode and add inner_mode\n\nThis patch adds a new field to xfrm states called inner_mode.  The existing\nmode object is renamed to outer_mode.\n\nThis is the first part of an attempt to fix inter-family transforms.  As it\nis we always use the outer family when determining which mode to use.  As a\nresult we may end up shoving IPv4 packets into netfilter6 and vice versa.\n\nWhat we really want is to use the inner family for the first part of outbound\nprocessing and the outer family for the second part.  For inbound processing\nwe\u0027d use the opposite pairing.\n\nI\u0027ve also added a check to prevent silly combinations such as transport mode\nwith inter-family transforms.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "17c2a42a24e1e8dd6aa7cea4f84e034ab1bfff31",
      "tree": "3ee494a16a43f575f8c4900deaab894b73b2953a",
      "parents": [
        "1bfcb10f670f5ff5e1d9f53e59680573524cb142"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Oct 17 21:33:12 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 17 21:33:12 2007 -0700"
      },
      "message": "[IPSEC]: Store afinfo pointer in xfrm_mode\n\nIt is convenient to have a pointer from xfrm_state to address-specific\nfunctions such as the output function for a family.  Currently the\naddress-specific policy code calls out to the xfrm state code to get\nthose pointers when we could get it in an easier way via the state\nitself.\n\nThis patch adds an xfrm_state_afinfo to xfrm_mode (since they\u0027re\naddress-specific) and changes the policy code to use it.  I\u0027ve also\nadded an owner field to do reference counting on the module providing\nthe afinfo even though it isn\u0027t strictly necessary today since IPv6\ncan\u0027t be unloaded yet.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1bfcb10f670f5ff5e1d9f53e59680573524cb142",
      "tree": "003b271a2c1e089ae6506d869b7a8c8f04dbde0a",
      "parents": [
        "aa5d62cc8777f733f8b59b5586c0a1989813189e"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Oct 17 21:31:50 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 17 21:31:50 2007 -0700"
      },
      "message": "[IPSEC]: Add missing BEET checks\n\nCurrently BEET mode does not reinject the packet back into the stack\nlike tunnel mode does.  Since BEET should behave just like tunnel mode\nthis is incorrect.\n\nThis patch fixes this by introducing a flags field to xfrm_mode that\ntells the IPsec code whether it should terminate and reinject the packet\nback into the stack.\n\nIt then sets the flag for BEET and tunnel mode.\n\nI\u0027ve also added a number of missing BEET checks elsewhere where we check\nwhether a given mode is a tunnel or not.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "aa5d62cc8777f733f8b59b5586c0a1989813189e",
      "tree": "e04d5c0032e7460031cb83162db64fc68244af3a",
      "parents": [
        "440725000cba0b1a68ca2df20124be3a5b7f7702"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Oct 17 21:31:12 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 17 21:31:12 2007 -0700"
      },
      "message": "[IPSEC]: Move type and mode map into xfrm_state.c\n\nThe type and mode maps are only used by SAs, not policies.  So it makes\nsense to move them from xfrm_policy.c into xfrm_state.c.  This also allows\nus to mark xfrm_get_type/xfrm_put_type/xfrm_get_mode/xfrm_put_mode as\nstatic.\n\nThe only other change I\u0027ve made in the move is to get rid of the casts\non the request_module call for types.  They\u0027re unnecessary because C\nwill promote them to ints anyway.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "440725000cba0b1a68ca2df20124be3a5b7f7702",
      "tree": "ae278e1b2b5aaed8f1e9d55e91c2913cde5ac653",
      "parents": [
        "7aa68cb90638ccc36559a936814e4c089892b3d9"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Oct 17 21:30:34 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 17 21:30:34 2007 -0700"
      },
      "message": "[IPSEC]: Fix length check in xfrm_parse_spi\n\nCurrently xfrm_parse_spi requires there to be 16 bytes for AH and ESP.\nIn contrived cases there may not actually be 16 bytes there since the\nrespective header sizes are less than that (8 and 12 currently).\n\nThis patch changes the test to use the actual header length instead of 16.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cd40b7d3983c708aabe3d3008ec64ffce56d33b0",
      "tree": "0d6fe9cfd2f03fdeee126e317d4bfb145afc458d",
      "parents": [
        "aed815601f3f95281ab3a01f7e2cbe1bd54285a0"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Wed Oct 10 21:15:29 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 10 21:15:29 2007 -0700"
      },
      "message": "[NET]: make netlink user -\u003e kernel interface synchronious\n\nThis patch make processing netlink user -\u003e kernel messages synchronious.\nThis change was inspired by the talk with Alexey Kuznetsov about current\nnetlink messages processing. He says that he was badly wrong when introduced \nasynchronious user -\u003e kernel communication.\n\nThe call netlink_unicast is the only path to send message to the kernel\nnetlink socket. But, unfortunately, it is also used to send data to the\nuser.\n\nBefore this change the user message has been attached to the socket queue\nand sk-\u003esk_data_ready was called. The process has been blocked until all\npending messages were processed. The bad thing is that this processing\nmay occur in the arbitrary process context.\n\nThis patch changes nlk-\u003edata_ready callback to get 1 skb and force packet\nprocessing right in the netlink_unicast.\n\nKernel -\u003e user path in netlink_unicast remains untouched.\n\nEINTR processing for in netlink_run_queue was changed. It forces rtnl_lock\ndrop, but the process remains in the cycle until the message will be fully\nprocessed. So, there is no need to use this kludges now.\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nAcked-by: Alexey Kuznetsov \u003ckuznet@ms2.inr.ac.ru\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b7c6538cd84f8072fad43bfce530f5bf695edbba",
      "tree": "e0ba79ffe7b79355985a45de9961b17a0462764f",
      "parents": [
        "050f009e16f908932070313c1745d09dc69fd62b"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:33:35 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:03 2007 -0700"
      },
      "message": "[IPSEC]: Move state lock into x-\u003etype-\u003eoutput\n\nThis patch releases the lock on the state before calling x-\u003etype-\u003eoutput.\nIt also adds the lock to the spots where they\u0027re currently needed.\n\nMost of those places (all except mip6) are expected to disappear with\nasync crypto.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "050f009e16f908932070313c1745d09dc69fd62b",
      "tree": "2176b8034065bf2e8b401865efcfaab912bb1997",
      "parents": [
        "68325d3b12ad5bce650c2883bb878257f197efff"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:31:47 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:02 2007 -0700"
      },
      "message": "[IPSEC]: Lock state when copying non-atomic fields to user-space\n\nThis patch adds locking so that when we\u0027re copying non-atomic fields such as\nlife-time or coaddr to user-space we don\u0027t get a partial result.\n\nFor af_key I\u0027ve changed every instance of pfkey_xfrm_state2msg apart from\nexpiration notification to include the keys and life-times.  This is in-line\nwith XFRM behaviour.\n\nThe actual cases affected are:\n\n* pfkey_getspi: No change as we don\u0027t have any keys to copy.\n* key_notify_sa:\n\t+ ADD/UPD: This wouldn\u0027t work otherwise.\n\t+ DEL: It can\u0027t hurt.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "68325d3b12ad5bce650c2883bb878257f197efff",
      "tree": "c6d15e03e017599b07742d0a8453e4ee8ee253e3",
      "parents": [
        "658b219e9379d75fbdc578b9630b598098471258"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:30:57 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:02 2007 -0700"
      },
      "message": "[XFRM] user: Move attribute copying code into copy_to_user_state_extra\n\nHere\u0027s a good example of code duplication leading to code rot.  The\nnotification patch did its own netlink message creation for xfrm states.\nIt duplicated code that was already in dump_one_state.  Guess what, the\nnext time (and the time after) when someone updated dump_one_state the\nnotification path got zilch.\n\nThis patch moves that code from dump_one_state to copy_to_user_state_extra\nand uses it in xfrm_notify_sa too.  Unfortunately whoever updates this\nstill needs to update xfrm_sa_len since the notification path wants to\nknow the exact size for allocation.\n\nAt least I\u0027ve added a comment saying so and if someone still forgest, we\u0027ll\nhave a WARN_ON telling us so.\n\nI also changed the security size calculation to use xfrm_user_sec_ctx since\nthat\u0027s what we actually put into the skb.  However it makes no practical\ndifference since it has the same size as xfrm_sec_ctx.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "658b219e9379d75fbdc578b9630b598098471258",
      "tree": "fe802c4e1ee6468a9c2558a5e529b2380845a003",
      "parents": [
        "75ba28c633952f7994a7117c98ae6515b58f8d30"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:29:52 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:01 2007 -0700"
      },
      "message": "[IPSEC]: Move common code into xfrm_alloc_spi\n\nThis patch moves some common code that conceptually belongs to the xfrm core\nfrom af_key/xfrm_user into xfrm_alloc_spi.\n\nIn particular, the spin lock on the state is now taken inside xfrm_alloc_spi.\nPreviously it also protected the construction of the response PF_KEY/XFRM\nmessages to user-space.  This is inconsistent as other identical constructions\nare not protected by the state lock.  This is bad because they in fact should\nbe protected but only in certain spots (so as not to hold the lock for too\nlong which may cause packet drops).\n\nThe SPI byte order conversion has also been moved.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "75ba28c633952f7994a7117c98ae6515b58f8d30",
      "tree": "5be5d5a366595d1bbbc4f890358c3405425ca6c5",
      "parents": [
        "007f0211a8872f32381f5d44becf8eb2f27f3c30"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:27:27 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:01 2007 -0700"
      },
      "message": "[IPSEC]: Remove gratuitous km wake-up events on ACQUIRE\n\nThere is no point in waking people up when creating/updating larval states\nbecause they\u0027ll just go back to sleep again as larval states by definition\ncannot be found by xfrm_state_find.\n\nWe should only wake them up when the larvals mature or die.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "007f0211a8872f32381f5d44becf8eb2f27f3c30",
      "tree": "9f6879726b6f016379368ebbde6ce3ec13faaa39",
      "parents": [
        "1ecafede835321ebdc396531245adc37d22366f7"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:25:59 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:00 2007 -0700"
      },
      "message": "[IPSEC]: Store IPv6 nh pointer in mac_header on output\n\nCurrent the x-\u003emode-\u003eoutput functions store the IPv6 nh pointer in the\nskb network header.  This is inconvenient because the network header then\nhas to be fixed up before the packet can leave the IPsec stack.  The mac\nheader field is unused on output so we can use that to store this instead.\n\nThis patch does that and removes the network header fix-up in xfrm_output.\n\nIt also uses ipv6_hdr where appropriate in the x-\u003etype-\u003eoutput functions.\n\nThere is also a minor clean-up in esp4 to make it use the same code as\nesp6 to help any subsequent effort to merge the two.\n\nLastly it kills two redundant skb_set_* statements in BEET that were\nsimply copied over from transport mode.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1ecafede835321ebdc396531245adc37d22366f7",
      "tree": "230419433b8a08b86abf8998da84652c66c3b20e",
      "parents": [
        "32f0c4cbe495d121c09ed14d9c84f9e1b9574415"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:24:07 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:54:59 2007 -0700"
      },
      "message": "[IPSEC]: Remove bogus ref count in xfrm_secpath_reject\n\nConstructs of the form\n\n\txfrm_state_hold(x);\n\tfoo(x);\n\txfrm_state_put(x);\n\ntend to be broken because foo is either synchronous where this is totally\nunnecessary or if foo is asynchronous then the reference count is in the\nwrong spot.\n\nIn the case of xfrm_secpath_reject, the function is synchronous and therefore\nwe should just kill the reference count.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    }
  ],
  "next": "45b17f48eaf5e5ff4202454985557b3240141caa"
}
