)]}'
{
  "log": [
    {
      "commit": "e104411b82f5c4d19752c335492036abdbf5880d",
      "tree": "03f26f98685689ab6bfa47d5bdbb6730f64bfadb",
      "parents": [
        "cf0b450cd5176b68ac7d5bbe68aeae6bb6a5a4b8"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Thu Sep 08 15:11:55 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Sep 08 15:11:55 2005 -0700"
      },
      "message": "[XFRM]: Always release dst_entry on error in xfrm_lookup\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ba89966c1984513f4f2cc0a6c182266be44ddd03",
      "tree": "6e5766fc5c287708c03e0a162531dfd4785b0703",
      "parents": [
        "29cb9f9c5502f6218cd3ea574efe46a5e55522d2"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Fri Aug 26 12:05:31 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Aug 29 16:11:18 2005 -0700"
      },
      "message": "[NET]: use __read_mostly on kmem_cache_t , DEFINE_SNMP_STAT pointers\n\nThis patch puts mostly read only data in the right section\n(read_mostly), to help sharing of these data between CPUS without\nmemory ping pongs.\n\nOn one of my production machine, tcp_statistics was sitting in a\nheavily modified cache line, so *every* SNMP update had to force a\nreload.\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "066286071d3542243baa68166acb779187c848b3",
      "tree": "ef6604f16ceb13842a30311654e6a64aac716c48",
      "parents": [
        "9a4595bc7e67962f13232ee55a64e063062c3a99"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Aug 15 12:33:26 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Aug 29 16:01:11 2005 -0700"
      },
      "message": "[NETLINK]: Add \"groups\" argument to netlink_kernel_create\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ac6d439d2097b72ea0cbc2322ce1263a38bc1fd0",
      "tree": "19e638a226993dddede5a2da577e2572f7555a95",
      "parents": [
        "d629b836d151d43332492651dd841d32e57ebe3b"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Aug 14 19:29:52 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Aug 29 16:00:54 2005 -0700"
      },
      "message": "[NETLINK]: Convert netlink users to use group numbers instead of bitmasks\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "43e943c32b9213b5d25407b281c94aaa474fd9a6",
      "tree": "7844a1aa95d697ae378bc799085e1b29eb0b8a48",
      "parents": [
        "ad93e266a17c6f606e96304c866eb73665ae34fa"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Aug 14 19:25:47 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Aug 29 16:00:34 2005 -0700"
      },
      "message": "[NETLINK]: Fix missing dst_groups initializations in netlink_broadcast users\n\nnetlink_broadcast users must initialize NETLINK_CB(skb).dst_groups to the\ndestination group mask for netlink_recvmsg.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4fdb3bb723db469717c6d38fda667d8b0fa86ebd",
      "tree": "43d82e717922e6319cf8a8f9dc5ee902c651b491",
      "parents": [
        "020b4c12dbe3868d792a01d7c1470cd837abe10f"
      ],
      "author": {
        "name": "Harald Welte",
        "email": "laforge@netfilter.org",
        "time": "Tue Aug 09 19:40:55 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Aug 29 15:35:08 2005 -0700"
      },
      "message": "[NETLINK]: Add properly module refcounting for kernel netlink sockets.\n\n- Remove bogus code for compiling netlink as module\n- Add module refcounting support for modules implementing a netlink\n  protocol\n- Add support for autoloading modules that implement a netlink protocol\n  as soon as someone opens a socket for that protocol\n\nSigned-off-by: Harald Welte \u003claforge@netfilter.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a4f1bac62564049ea4718c4624b0fadc9f597c84",
      "tree": "294ef690f2b8978ee83b9e4e7dadbfb391ea1f94",
      "parents": [
        "cadf01c2fc0cd66dfef4956ef1a6482ed01c3150"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Jul 26 15:43:17 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 26 15:43:17 2005 -0700"
      },
      "message": "[XFRM]: Fix possible overflow of sock-\u003esk_policy\n\nSpotted by, and original patch by, Balazs Scheidler.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6a2e9b738cb5c929df73b6acabdd8f9a4e9a0416",
      "tree": "c7cdf9033093b52e360ad04dc29739ca36a617a4",
      "parents": [
        "d5950b4355049092739bea97d1bdc14433126cc5"
      ],
      "author": {
        "name": "Sam Ravnborg",
        "email": "sam@ravnborg.org",
        "time": "Mon Jul 11 21:13:56 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 11 21:13:56 2005 -0700"
      },
      "message": "[NET]: move config options out to individual protocols\n\nMove the protocol specific config options out to the specific protocols.\nWith this change net/Kconfig now starts to become readable and serve as a\ngood basis for further re-structuring.\n\nThe menu structure is left almost intact, except that indention is\nfixed in most cases. Most visible are the INET changes where several\n\"depends on INET\" are replaced with a single ifdef INET / endif pair.\n\nSeveral new files were created to accomplish this change - they are\nsmall but serve the purpose that config options are now distributed\nout where they belongs.\n\nSigned-off-by: Sam Ravnborg \u003csam@ravnborg.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d094cd83c06e06e01d8edb540555f3f64e4081c2",
      "tree": "c9aad8ebaebbf0cde7c535bb764a6d6e859125fb",
      "parents": [
        "72cb6962a91f2af9eef69a06198e1949c10259ae"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Jun 20 13:19:41 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jun 20 13:19:41 2005 -0700"
      },
      "message": "[IPSEC]: Add xfrm_state_afinfo-\u003einit_flags\n\nThis patch adds the xfrm_state_afinfo-\u003einit_flags hook which allows\neach address family to perform any common initialisation that does\nnot require a corresponding destructor call.\n\nIt will be used subsequently to set the XFRM_STATE_NOPMTUDISC flag\nin IPv4.\n\nIt also fixes up the error codes returned by xfrm_init_state.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nAcked-by: James Morris \u003cjmorris@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "72cb6962a91f2af9eef69a06198e1949c10259ae",
      "tree": "3ae65d1c4e7d7cb7ac05bfc6f457312df45f6996",
      "parents": [
        "3f7a87d2fa9b42f7aade43914f060df68cc89cc7"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Jun 20 13:18:08 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jun 20 13:18:08 2005 -0700"
      },
      "message": "[IPSEC]: Add xfrm_init_state\n\nThis patch adds xfrm_init_state which is simply a wrapper that calls\nxfrm_get_type and subsequently x-\u003etype-\u003einit_state.  It also gets rid\nof the unused args argument.\n\nAbstracting it out allows us to add common initialisation code, e.g.,\nto set family-specific flags.\n\nThe add_time setting in xfrm_user.c was deleted because it\u0027s already\nset by xfrm_state_alloc.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nAcked-by: James Morris \u003cjmorris@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0603eac0d6b77acac5924a2734228cbaf072f993",
      "tree": "e51536aab48997cc74f83bc618b95a9d88df12f2",
      "parents": [
        "b6544c0b4cf2bd96195f3cdb7cebfb35090fc557"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat Jun 18 22:54:36 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:54:36 2005 -0700"
      },
      "message": "[IPSEC]: Add XFRMA_SA/XFRMA_POLICY for delete notification\n\nThis patch changes the format of the XFRM_MSG_DELSA and\nXFRM_MSG_DELPOLICY notification so that the main message\nsent is of the same format as that received by the kernel\nif the original message was via netlink.  This also means\nthat we won\u0027t lose the byid information carried in km_event.\n\nSince this user interface is introduced by Jamal\u0027s patch\nwe can still afford to change it.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ee57eef99b9e19194677f552ebc0690ec35d62db",
      "tree": "f7a6568dc56d60bba6d68d427bd019f491dc81d1",
      "parents": [
        "7d6dfe1f5bc4c56e0c31173014a099ec3fa35907"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Sat Jun 18 22:45:56 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:45:56 2005 -0700"
      },
      "message": "[IPSEC] Use NLMSG_LENGTH in xfrm_exp_state_notify\n\nSmall fixup to use netlink macros instead of hardcoding.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7d6dfe1f5bc4c56e0c31173014a099ec3fa35907",
      "tree": "a6b04337c4f6d1ff7b050082dc7e69dc5617d3d0",
      "parents": [
        "f60f6b8f70c756fc786d68f02ec17a1e84db645f"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sat Jun 18 22:45:31 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:45:31 2005 -0700"
      },
      "message": "[IPSEC] Fix xfrm_state leaks in error path\n\nHerbert Xu wrote:\n\u003e @@ -1254,6 +1326,7 @@ static int pfkey_add(struct sock *sk, st\n\u003e       if (IS_ERR(x))\n\u003e               return PTR_ERR(x);\n\u003e\n\u003e +     xfrm_state_hold(x);\n\nThis introduces a leak when xfrm_state_add()/xfrm_state_update()\nfail. We hold two references (one from xfrm_state_alloc(), one\nfrom xfrm_state_hold()), but only drop one. We need to take the\nreference because the reference from xfrm_state_alloc() can\nbe dropped by __xfrm_state_delete(), so the fix is to drop both\nreferences on error. Same problem in xfrm_user.c.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f60f6b8f70c756fc786d68f02ec17a1e84db645f",
      "tree": "8eee05de129439e4ffde876d2208a613178acfe3",
      "parents": [
        "e7443892f656d760ec1b9d92567178c87e100f4a"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat Jun 18 22:44:37 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:44:37 2005 -0700"
      },
      "message": "[IPSEC] Use XFRM_MSG_* instead of XFRM_SAP_*\n\nThis patch removes XFRM_SAP_* and converts them over to XFRM_MSG_*.\nThe netlink interface is meant to map directly onto the underlying\nxfrm subsystem.  Therefore rather than using a new independent\nrepresentation for the events we can simply use the existing ones\nfrom xfrm_user.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "e7443892f656d760ec1b9d92567178c87e100f4a",
      "tree": "1fafb0ca8fd4b81af36a2460b4acad3f68bef8ab",
      "parents": [
        "bf08867f91a43aa3ba2e4598c06c4769a6cdddf6"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat Jun 18 22:44:18 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:44:18 2005 -0700"
      },
      "message": "[IPSEC] Set byid for km_event in xfrm_get_policy\n\nThis patch fixes policy deletion in xfrm_user so that it sets\nkm_event.data.byid.  This puts xfrm_user on par with what af_key\ndoes in this case.\n   \nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "bf08867f91a43aa3ba2e4598c06c4769a6cdddf6",
      "tree": "316504b4756a32d802ea037815f2d9022ab88bfe",
      "parents": [
        "4f09f0bbc1cb3c74e8f2047ad4be201a059829ee"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat Jun 18 22:44:00 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:44:00 2005 -0700"
      },
      "message": "[IPSEC] Turn km_event.data into a union\n\nThis patch turns km_event.data into a union.  This makes code that\nuses it clearer.\n  \nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "4666faab095230ec8aa62da6c33391287f281154",
      "tree": "36d61925bb02dd7de537ff65d35190eeebbf47fa",
      "parents": [
        "26b15dad9f1c19d6d4f7b999b07eaa6d98e4b375"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat Jun 18 22:43:22 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:43:22 2005 -0700"
      },
      "message": "[IPSEC] Kill spurious hard expire messages\n\nThis patch ensures that the hard state/policy expire notifications are\nonly sent when the state/policy is successfully removed from their\nrespective tables.\n\nAs it is, it\u0027s possible for a state/policy to both expire through\nreaching a hard limit, as well as being deleted by the user.\n\nNote that this behaviour isn\u0027t actually forbidden by RFC 2367.\nHowever, it is a quality of implementation issue.\n\nAs an added bonus, the restructuring in this patch will help\neventually in moving the expire notifications from softirq\ncontext into process context, thus improving their reliability.\n\nOne important side-effect from this change is that SAs reaching\ntheir hard byte/packet limits are now deleted immediately, just\nlike SAs that have reached their hard time limits.\n\nPreviously they were announced immediately but only deleted after\n30 seconds.\n\nThis is bad because it prevents the system from issuing an ACQUIRE\ncommand until the existing state was deleted by the user or expires\nafter the time is up.\n\nIn the scenario where the expire notification was lost this introduces\na 30 second delay into the system for no good reason.\n \nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "26b15dad9f1c19d6d4f7b999b07eaa6d98e4b375",
      "tree": "2ca3039488d9df023fb84eaa7c1f52aa8d1ce69c",
      "parents": [
        "3aa3dfb372576f30835a94409556e3c8681b5756"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Sat Jun 18 22:42:13 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:42:13 2005 -0700"
      },
      "message": "[IPSEC] Add complete xfrm event notification\n\nHeres the final patch.\nWhat this patch provides\n\n- netlink xfrm events\n- ability to have events generated by netlink propagated to pfkey\n  and vice versa.\n- fixes the acquire lets-be-happy-with-one-success issue\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "92d63decc0b6a5d600f792fcf5f3ff9718c09a3d",
      "tree": "eca15d3ffba7795ea4d9bef9cdc6d21c7c71fa00",
      "parents": [
        "2f872f0401d4b470990864fbf99c19130f25ad4d"
      ],
      "author": {
        "name": "Hideaki YOSHIFUJI",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu May 26 12:58:04 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu May 26 12:58:04 2005 -0700"
      },
      "message": "From: Kazunori Miyazawa \u003ckazunori@miyazawa.org\u003e\n\n[XFRM] Call dst_check() with appropriate cookie\n\nThis fixes infinite loop issue with IPv6 tunnel mode.\n\nSigned-off-by: Kazunori Miyazawa \u003ckazunori@miyazawa.org\u003e\nSigned-off-by: Hideaki YOSHIFUJI \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "31c26852cb2ac77f1d4acb37bcf31f165fd5eb68",
      "tree": "ce2e98c79f4d9051baff55c5f5fdb90defb9e18e",
      "parents": [
        "b9e9dead05b19e7f52c9aa00cd3a5b7ac4fcacf4"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu May 19 12:39:49 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu May 19 12:39:49 2005 -0700"
      },
      "message": "[IPSEC]: Verify key payload in verify_one_algo\n\nWe need to verify that the payload contains enough data so that\nattach_one_algo can copy alg_key_len bits from the payload.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b9e9dead05b19e7f52c9aa00cd3a5b7ac4fcacf4",
      "tree": "89852e61eaea7cd88c652e91b594fd8f4c312a9d",
      "parents": [
        "8be58932ca596972e4953ae980d8bc286857cae8"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu May 19 12:39:04 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu May 19 12:39:04 2005 -0700"
      },
      "message": "[IPSEC]: Fixed alg_key_len usage in attach_one_algo\n\nThe variable alg_key_len is in bits and not bytes.  The function\nattach_one_algo is currently using it as if it were in bytes.\nThis causes it to read memory which may not be there.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d48102007d068df7ba3055cdc1723e12db1ba30f",
      "tree": "54f01cd1163bb552d5e1a647069663c4a28a1396",
      "parents": [
        "f7383c22246cfccbe912541dd83103009ed2b537"
      ],
      "author": {
        "name": "Evgeniy Polyakov",
        "email": "johnpol@2ka.mipt.ru",
        "time": "Wed May 18 22:51:45 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed May 18 22:51:45 2005 -0700"
      },
      "message": "[XFRM]: skb_cow_data() does not set proper owner for new skbs.\n\nIt looks like skb_cow_data() does not set \nproper owner for newly created skb.\n\nIf we have several fragments for skb and some of them\nare shared(?) or cloned (like in async IPsec) there \nmight be a situation when we require recreating skb and \nthus using skb_copy() for it.\nNewly created skb has neither a destructor nor a socket\nassotiated with it, which must be copied from the old skb.\nAs far as I can see, current code sets destructor and socket\nfor the first one skb only and uses truesize of the first skb\nonly to increment sk_wmem_alloc value.\n\nIf above \"analysis\" is correct then attached patch fixes that.\n\nSigned-off-by: Evgeniy Polyakov \u003cjohnpol@2ka.mipt.ru\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "aabc9761b69f1bfa30a78f7005be95cc9cc06175",
      "tree": "50dc9f510011ac03656aeba0595b2b0b5c5f5e22",
      "parents": [
        "d5d75cd6b10ddad2f375b61092754474ad78aec7"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue May 03 16:27:10 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 03 16:27:10 2005 -0700"
      },
      "message": "[IPSEC]: Store idev entries\n\nI found a bug that stopped IPsec/IPv6 from working.  About\na month ago IPv6 started using rt6i_idev-\u003edev on the cached socket dst\nentries.  If the cached socket dst entry is IPsec, then rt6i_idev will\nbe NULL.\n\nSince we want to look at the rt6i_idev of the original route in this\ncase, the easiest fix is to store rt6i_idev in the IPsec dst entry just\nas we do for a number of other IPv6 route attributes.  Unfortunately\nthis means that we need some new code to handle the references to\nrt6i_idev.  That\u0027s why this patch is bigger than it would otherwise be.\n\nI\u0027ve also done the same thing for IPv4 since it is conceivable that\nonce these idev attributes start getting used for accounting, we\nprobably need to dereference them for IPv4 IPsec entries too.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0f4821e7b93fe72e89b8ff393bd8e705bd178aa5",
      "tree": "e9116a4ce6593b186c3962fcdc5baf73f243d0b5",
      "parents": [
        "09e14305982efc2f3b509d3c50ef5dcbff64a998"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue May 03 16:15:59 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 03 16:15:59 2005 -0700"
      },
      "message": "[XFRM/RTNETLINK]: Decrement qlen properly in {xfrm_,rt}netlink_rcv().\n\nIf we free up a partially processed packet because it\u0027s\nskb-\u003elen dropped to zero, we need to decrement qlen because\nwe are dropping out of the top-level loop so it will do\nthe decrement for us.\n\nSpotted by Herbert Xu.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "09e14305982efc2f3b509d3c50ef5dcbff64a998",
      "tree": "7829c8b212a84e793ebf2d5bd0ceb68283c7b79e",
      "parents": [
        "2a0a6ebee1d68552152ae8d4aeda91d806995dec"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue May 03 15:30:05 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 03 15:30:05 2005 -0700"
      },
      "message": "[NETLINK]: Fix infinite loops in synchronous netlink changes.\n\nThe qlen should continue to decrement, even if we\npop partially processed SKBs back onto the receive queue.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2a0a6ebee1d68552152ae8d4aeda91d806995dec",
      "tree": "a0b77861b3395b4728e75f2b2f92755e0a4777d3",
      "parents": [
        "96c36023434b7b6824b1da72a6b7b1ca61d7310c"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue May 03 14:55:09 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 03 14:55:09 2005 -0700"
      },
      "message": "[NETLINK]: Synchronous message processing.\n\nLet\u0027s recap the problem.  The current asynchronous netlink kernel\nmessage processing is vulnerable to these attacks:\n\n1) Hit and run: Attacker sends one or more messages and then exits\nbefore they\u0027re processed.  This may confuse/disable the next netlink\nuser that gets the netlink address of the attacker since it may\nreceive the responses to the attacker\u0027s messages.\n\nProposed solutions:\n\na) Synchronous processing.\nb) Stream mode socket.\nc) Restrict/prohibit binding.\n\n2) Starvation: Because various netlink rcv functions were written\nto not return until all messages have been processed on a socket,\nit is possible for these functions to execute for an arbitrarily\nlong period of time.  If this is successfully exploited it could\nalso be used to hold rtnl forever.\n\nProposed solutions:\n\na) Synchronous processing.\nb) Stream mode socket.\n\nFirstly let\u0027s cross off solution c).  It only solves the first\nproblem and it has user-visible impacts.  In particular, it\u0027ll\nbreak user space applications that expect to bind or communicate\nwith specific netlink addresses (pid\u0027s).\n\nSo we\u0027re left with a choice of synchronous processing versus\nSOCK_STREAM for netlink.\n\nFor the moment I\u0027m sticking with the synchronous approach as\nsuggested by Alexey since it\u0027s simpler and I\u0027d rather spend\nmy time working on other things.\n\nHowever, it does have a number of deficiencies compared to the\nstream mode solution:\n\n1) User-space to user-space netlink communication is still vulnerable.\n\n2) Inefficient use of resources.  This is especially true for rtnetlink\nsince the lock is shared with other users such as networking drivers.\nThe latter could hold the rtnl while communicating with hardware which\ncauses the rtnetlink user to wait when it could be doing other things.\n\n3) It is still possible to DoS all netlink users by flooding the kernel\nnetlink receive queue.  The attacker simply fills the receive socket\nwith a single netlink message that fills up the entire queue.  The\nattacker then continues to call sendmsg with the same message in a loop.\n\nPoint 3) can be countered by retransmissions in user-space code, however\nit is pretty messy.\n\nIn light of these problems (in particular, point 3), we should implement\nstream mode netlink at some point.  In the mean time, here is a patch\nthat implements synchronous processing.  \n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "492b558b3191319cbc859a9e025bc354d336c261",
      "tree": "44e4aef7da73c9d4fd0e31bdfe26399f52a9f0cd",
      "parents": [
        "526bdb80a23b2e10ed4ccc3fcf309c9118d892d6"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Tue May 03 14:26:40 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 03 14:26:40 2005 -0700"
      },
      "message": "[XFRM]: Cleanup xfrm_msg_min and xfrm_dispatch\n\nConverts xfrm_msg_min and xfrm_dispatch to use c99 designated\ninitializers to make greping a little bit easier. Also replaces\ntwo hardcoded message type with meaningful names.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5c5d281a93e9816966b6131ccec19519dab0e103",
      "tree": "a897ec464a600d7a678052bfd5e52378470a45fe",
      "parents": [
        "7938109fff944e0117976a39946d99d2b0b0250d"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Thu Apr 21 20:12:32 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Apr 21 20:12:32 2005 -0700"
      },
      "message": "[XFRM]: Fix existence lookup in xfrm_state_find\n\nUse \u0027daddr\u0027 instead of \u0026tmpl-\u003eid.daddr, since the latter\nmight be zero.  Also, only perform the lookup when\ntmpl-\u003eid.spi is non-zero.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
      "tree": "0bba044c4ce775e45a88a51686b5d9f90697ea9d",
      "parents": [],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@ppc970.osdl.org",
        "time": "Sat Apr 16 15:20:36 2005 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@ppc970.osdl.org",
        "time": "Sat Apr 16 15:20:36 2005 -0700"
      },
      "message": "Linux-2.6.12-rc2\n\nInitial git repository build. I\u0027m not bothering with the full history,\neven though we have it. We can create a separate \"historical\" git\narchive of that later if we want to, and in the meantime it\u0027s about\n3.2GB when imported into git - space that would just make the early\ngit days unnecessarily complicated, when we don\u0027t have a lot of good\ninfrastructure for it.\n\nLet it rip!\n"
    }
  ]
}
