)]}'
{
  "log": [
    {
      "commit": "0c11b9428f619ab377c92eff2f160a834a6585dd",
      "tree": "35b573715ad5730a77d067486838345132771a7a",
      "parents": [
        "24e1c13c93cbdd05e4b7ea921c0050b036555adc"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Thu Jan 10 04:20:52 2008 -0500"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Fri Feb 01 14:04:59 2008 -0500"
      },
      "message": "[PATCH] switch audit_get_loginuid() to task_struct *\n\nall callers pass something-\u003eaudit_context\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "9472c9ef645d03ea823801d7716e658aeaf894e4",
      "tree": "349327bc0ea264312a2d753840e7c32590e4f6c8",
      "parents": [
        "5255dc6e14ce640ccb3e062362510a00ac59bbcd"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Thu Jan 31 17:14:58 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:28:30 2008 -0800"
      },
      "message": "[XFRM]: Fix statistics.\n\no Outbound sequence number overflow error status\n  is counted as XfrmOutStateSeqError.\no Additionaly, it changes inbound sequence number replay\n  error name from XfrmInSeqOutOfWindow to XfrmInStateSeqError\n  to apply name scheme above.\no Inbound IPv4 UDP encapsuling type mismatch error is wrongly\n  mapped to XfrmInStateInvalid then this patch fiex the error\n  to XfrmInStateMismatch.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5255dc6e14ce640ccb3e062362510a00ac59bbcd",
      "tree": "fe8799b5c48dcb2a39629f103e3053fffc113026",
      "parents": [
        "cc8fd14dcaad61be74cbd5879f27a76f91473a3f"
      ],
      "author": {
        "name": "Adrian Bunk",
        "email": "bunk@kernel.org",
        "time": "Thu Jan 31 17:10:30 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:28:29 2008 -0800"
      },
      "message": "[XFRM]: Remove unused exports.\n\nThis patch removes the following no longer used EXPORT_SYMBOL\u0027s:\n- xfrm_input.c: xfrm_parse_spi\n- xfrm_state.c: xfrm_replay_check\n- xfrm_state.c: xfrm_replay_advance\n\nSigned-off-by: Adrian Bunk \u003cbunk@kernel.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "533cb5b0a63f28ecab5503cfceb77e641fa7f7c4",
      "tree": "62e7d7c65776c5fb30a8ff10fb3049e63257331c",
      "parents": [
        "2216b48376c40cf6984398d478a01b55e76c5434"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Wed Jan 30 19:11:50 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:27:20 2008 -0800"
      },
      "message": "[XFRM]: constify \u0027struct xfrm_type\u0027\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1a6509d991225ad210de54c63314fd9542922095",
      "tree": "afe5c560388558bebd3e21b7c6f789a28a323a51",
      "parents": [
        "6fbf2cb77461a0cd0675228d20dd0f70d7b2251f"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Jan 28 19:37:29 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:27:03 2008 -0800"
      },
      "message": "[IPSEC]: Add support for combined mode algorithms\n\nThis patch adds support for combined mode algorithms with GCM being\nthe first algorithm supported.\n\nCombined mode algorithms can be added through the xfrm_user interface\nusing the new algorithm payload type XFRMA_ALG_AEAD.  Each algorithms\nis identified by its name and the ICV length.\n\nFor the purposes of matching algorithms in xfrm_tmpl structures,\ncombined mode algorithms occupy the same name space as encryption\nalgorithms.  This is in line with how they are negotiated using IKE.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6fbf2cb77461a0cd0675228d20dd0f70d7b2251f",
      "tree": "42f95202bb4095eaf9f498519d8ae63036214448",
      "parents": [
        "38320c70d282be1997a5204c7c7fe14c3aa6bfaa"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Jan 28 19:35:49 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 31 19:27:02 2008 -0800"
      },
      "message": "[IPSEC]: Allow async algorithms\n\nNow that ESP uses authenc we can turn on the support for async\nalgorithms in IPsec.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b7c6ba6eb1234e35a74fb8ba8123232a7b1ba9e4",
      "tree": "672c08c95229a6ac242ab12a5195dceddb0f3127",
      "parents": [
        "4f84d82f7a623f8641af2574425c329431ff158f"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Mon Jan 28 14:41:19 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:08:07 2008 -0800"
      },
      "message": "[NETNS]: Consolidate kernel netlink socket destruction.\n\nCreate a specific helper for netlink kernel socket disposal. This just\nlet the code look better and provides a ground for proper disposal\ninside a namespace.\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nTested-by: Alexey Dobriyan \u003cadobriyan@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1486cbd777316e55aa30aeb37e231ce618c29d2e",
      "tree": "f53c510b99b1d06bcecb396c6e11f75c56ca335c",
      "parents": [
        "cea14e0ed6082bd3dff19203d01340de6e7ca067"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Sat Jan 12 03:20:03 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:01:49 2008 -0800"
      },
      "message": "[XFRM] xfrm_policy: kill some bloat\n\nnet/xfrm/xfrm_policy.c:\n  xfrm_audit_policy_delete | -692\n  xfrm_audit_policy_add    | -692\n 2 functions changed, 1384 bytes removed, diff: -1384\n\nnet/xfrm/xfrm_policy.c:\n  xfrm_audit_common_policyinfo | +704\n 1 function changed, 704 bytes added, diff: +704\n\nnet/xfrm/xfrm_policy.o:\n 3 functions changed, 704 bytes added, 1384 bytes removed, diff: -680\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "50dd79653e295ce40da38c03bbfb5966aa1c1598",
      "tree": "c96cee5292a6d335978d578043a6c436d42e7ad3",
      "parents": [
        "06eaa1a01d033bd5fd298b010334034f93021fbe"
      ],
      "author": {
        "name": "Sebastian Siewior",
        "email": "sebastian@breakpoint.cc",
        "time": "Wed Jan 09 00:36:17 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:01:12 2008 -0800"
      },
      "message": "[XFRM]: Remove ifdef crypto.\n\nand select the crypto subsystem if neccessary\n\nSigned-off-by: Sebastian Siewior \u003csebastian@breakpoint.cc\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6666351df90656677723f8232b3fdd26a500e51e",
      "tree": "bdbc17a38c257153e9f70fed37cc06c643644648",
      "parents": [
        "40ccbf525e55fc6d1f3a88c1e98b13db4dd618db"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Tue Jan 08 01:35:52 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:49 2008 -0800"
      },
      "message": "[XFRM]: xfrm_state_clone() should be static, not exported\n\nxfrm_state_clone() is not used outside of net/xfrm/xfrm_state.c\nThere is no need to export it.\n\nSpoted by sparse checker.\n   CHECK   net/xfrm/xfrm_state.c\nnet/xfrm/xfrm_state.c:1103:19: warning: symbol \u0027xfrm_state_clone\u0027 was not\ndeclared. Should it be static?\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "64c31b3f76482bb64459e786f9eca3bd0164d153",
      "tree": "4f8fa9e23dbb2b2a73c4516263c983b01cff4f3a",
      "parents": [
        "d66e37a99d323012165ce91fd5c4518e2fcea0c5"
      ],
      "author": {
        "name": "WANG Cong",
        "email": "xiyou.wangcong@gmail.com",
        "time": "Mon Jan 07 22:34:29 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:46 2008 -0800"
      },
      "message": "[XFRM] xfrm_policy_destroy: Rename and relative fixes.\n\nSince __xfrm_policy_destroy is used to destory the resources\nallocated by xfrm_policy_alloc. So using the name\n__xfrm_policy_destroy is not correspond with xfrm_policy_alloc.\nRename it to xfrm_policy_destroy.\n\nAnd along with some instances that call xfrm_policy_alloc\nbut not using xfrm_policy_destroy to destroy the resource,\nfix them.\n\nSigned-off-by: WANG Cong \u003cxiyou.wangcong@gmail.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d66e37a99d323012165ce91fd5c4518e2fcea0c5",
      "tree": "8b4d420f207864ac65bcc5d4f5af1b3a8cde6cf2",
      "parents": [
        "a067d9ac39cd207b5a0994c73199a56e7d5a17a3"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Mon Jan 07 21:46:15 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:45 2008 -0800"
      },
      "message": "[XFRM] Statistics: Add outbound-dropping error.\n\no Increment PolError counter when flow_cache_lookup() returns\n  errored pointer.\n\no Increment NoStates counter at larval-drop.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cf35f43e6e41b160d8dedd80a127210fd3be9ada",
      "tree": "98489c87532e0d3014217fe756907339a4bd6285",
      "parents": [
        "ad1b30b1c282bc8c726a9b123a1312a3930bcd42"
      ],
      "author": {
        "name": "Ilpo Järvinen",
        "email": "ilpo.jarvinen@helsinki.fi",
        "time": "Sat Jan 05 23:13:20 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:43 2008 -0800"
      },
      "message": "[XFRM]: Kill some bloat\n\nnet/xfrm/xfrm_state.c:\n  xfrm_audit_state_delete          | -589\n  xfrm_replay_check                | -542\n  xfrm_audit_state_icvfail         | -520\n  xfrm_audit_state_add             | -589\n  xfrm_audit_state_replay_overflow | -523\n  xfrm_audit_state_notfound_simple | -509\n  xfrm_audit_state_notfound        | -521\n 7 functions changed, 3793 bytes removed, diff: -3793\n\nnet/xfrm/xfrm_state.c:\n  xfrm_audit_helper_pktinfo | +522\n  xfrm_audit_helper_sainfo  | +598\n 2 functions changed, 1120 bytes added, diff: +1120\n\nnet/xfrm/xfrm_state.o:\n 9 functions changed, 1120 bytes added, 3793 bytes removed, diff: -2673\n\nSigned-off-by: Ilpo Järvinen \u003cilpo.jarvinen@helsinki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "dbb1db8b59fb84d620ab5266366b52c8052ee75c",
      "tree": "3df775d08d9bf81494c184e2b6dc7390dbe0de54",
      "parents": [
        "9a429c4983deae020f1e757ecc8f547b6d4e2f2b"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Jan 01 23:52:59 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:32 2008 -0800"
      },
      "message": "[IPSEC]: Return EOVERFLOW when output sequence number overflows\n\nPreviously we made it an error on the output path if the sequence number\noverflowed.  However we did not set the err variable accordingly.  This\npatch sets err to -EOVERFLOW in that case.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9a429c4983deae020f1e757ecc8f547b6d4e2f2b",
      "tree": "172e27a5866e182b902cd77506df1755aafadb60",
      "parents": [
        "b950dfcf504842a0f2bb142a33ef938f1c00d300"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Tue Jan 01 21:58:02 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:31 2008 -0800"
      },
      "message": "[NET]: Add some acquires/releases sparse annotations.\n\nAdd __acquires() and __releases() annotations to suppress some sparse\nwarnings.\n\nexample of warnings :\n\nnet/ipv4/udp.c:1555:14: warning: context imbalance in \u0027udp_seq_start\u0027 - wrong\ncount at exit\nnet/ipv4/udp.c:1571:13: warning: context imbalance in \u0027udp_seq_stop\u0027 -\nunexpected unlock\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9dd3245a2ac1834797191072705015e6a12f55bf",
      "tree": "b8f05a146de3729698ef7627e68251ee68a2a472",
      "parents": [
        "0883ae0e5599656b5f3b0e9ce474e01dee7dfee4"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Dec 30 21:10:30 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:10 2008 -0800"
      },
      "message": "[IPSEC]: Move all calls to xfrm_audit_state_icvfail to xfrm_input\n\nLet\u0027s nip the code duplication in the bud :)\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fcb8c156c8277ee9d71c8c81587d494c9c5240b3",
      "tree": "49ee171a80205f7c8d9cd9ae4e02955b547d11e6",
      "parents": [
        "15ca36fb994923b454df44e5d7aa14b84ce5aee4"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Dec 30 21:09:38 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:09 2008 -0800"
      },
      "message": "[IPSEC]: Fix double free on skb on async output\n\nWhen the output transform returns EINPROGRESS due to async operation we\u0027ll\nfree the skb the straight away as if it were an error.  This patch fixes\nthat so that the skb is freed when the async operation completes.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b15c4bcd15741b31019379298edfca28dc78029d",
      "tree": "714ec07cf667fdc3ab2a8655e7f65f2ecb96ba2e",
      "parents": [
        "426b5303eb435d98b9bee37a807be386bc2b3320"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Mon Dec 24 16:00:09 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:04 2008 -0800"
      },
      "message": "[XFRM]: Fix outbound statistics.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e1af9f270b69a3ad1dcbabb404dd1f40a96f43f5",
      "tree": "8dc77b5c842a517d0d19bba835897846f77ec647",
      "parents": [
        "afeb14b49098ba7a51c96e083a4105a0301f94c4"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Fri Dec 21 14:59:08 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:02 2008 -0800"
      },
      "message": "[XFRM]: Drop packets when replay counter would overflow\n\nAccording to RFC4303, section 3.3.3 we need to drop outgoing packets which\ncause the replay counter to overflow:\n\n   3.3.3.  Sequence Number Generation\n\n   The sender\u0027s counter is initialized to 0 when an SA is established.\n   The sender increments the sequence number (or ESN) counter for this\n   SA and inserts the low-order 32 bits of the value into the Sequence\n   Number field.  Thus, the first packet sent using a given SA will\n   contain a sequence number of 1.\n\n   If anti-replay is enabled (the default), the sender checks to ensure\n   that the counter has not cycled before inserting the new value in the\n   Sequence Number field.  In other words, the sender MUST NOT send a\n   packet on an SA if doing so would cause the sequence number to cycle.\n   An attempt to transmit a packet that would result in sequence number\n   overflow is an auditable event.  The audit log entry for this event\n   SHOULD include the SPI value, current date/time, Source Address,\n   Destination Address, and (in IPv6) the cleartext Flow ID.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "afeb14b49098ba7a51c96e083a4105a0301f94c4",
      "tree": "2675451596adbea8aa261704c356d074136abbbd",
      "parents": [
        "dfd4f0ae2e111e2b93c295938c0e64ebbb69ae6e"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Fri Dec 21 14:58:11 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 15:00:01 2008 -0800"
      },
      "message": "[XFRM]: RFC4303 compliant auditing\n\nThis patch adds a number of new IPsec audit events to meet the auditing\nrequirements of RFC4303.  This includes audit hooks for the following events:\n\n * Could not find a valid SA [sections 2.1, 3.4.2]\n   . xfrm_audit_state_notfound()\n   . xfrm_audit_state_notfound_simple()\n\n * Sequence number overflow [section 3.3.3]\n   . xfrm_audit_state_replay_overflow()\n\n * Replayed packet [section 3.4.3]\n   . xfrm_audit_state_replay()\n\n * Integrity check failure [sections 3.4.4.1, 3.4.4.2]\n   . xfrm_audit_state_icvfail()\n\nWhile RFC4304 deals only with ESP most of the changes in this patch apply to\nIPsec in general, i.e. both AH and ESP.  The one case, integrity check\nfailure, where ESP specific code had to be modified the same was done to the\nAH code for the sake of consistency.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "68277accb3a5f004344f4346498640601b8b7016",
      "tree": "e6b541283a516406fbd936051028845a20f5a7c4",
      "parents": [
        "8ea843495df36036cb7f22f61994b34f8362b443"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Thu Dec 20 20:49:33 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:40 2008 -0800"
      },
      "message": "[XFRM]: Assorted IPsec fixups\n\nThis patch fixes a number of small but potentially troublesome things in the\nXFRM/IPsec code:\n\n * Use the \u0027audit_enabled\u0027 variable already in include/linux/audit.h\n   Removed the need for extern declarations local to each XFRM audit fuction\n\n * Convert \u0027sid\u0027 to \u0027secid\u0027 everywhere we can\n   The \u0027sid\u0027 name is specific to SELinux, \u0027secid\u0027 is the common naming\n   convention used by the kernel when refering to tokenized LSM labels,\n   unfortunately we have to leave \u0027ctx_sid\u0027 in \u0027struct xfrm_sec_ctx\u0027 otherwise\n   we risk breaking userspace\n\n * Convert address display to use standard NIP* macros\n   Similar to what was recently done with the SPD audit code, this also also\n   includes the removal of some unnecessary memcpy() calls\n\n * Move common code to xfrm_audit_common_stateinfo()\n   Code consolidation from the \"less is more\" book on software development\n\n * Proper spacing around commas in function arguments\n   Minor style tweak since I was already touching the code\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8ea843495df36036cb7f22f61994b34f8362b443",
      "tree": "0038a215ddaedf1eab19969636a95ebc9ecb6694",
      "parents": [
        "0aa647746e5602e608220c10e51f49709a030f5d"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Thu Dec 20 20:44:02 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:39 2008 -0800"
      },
      "message": "[XFRM]: Add packet processing statistics option.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0aa647746e5602e608220c10e51f49709a030f5d",
      "tree": "514cde2ddf6308b0f1dfd83039cb8dd62b2c69d2",
      "parents": [
        "558f82ef6e0d25e87f7468c07b6db1fbbf95a855"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Thu Dec 20 20:43:36 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:39 2008 -0800"
      },
      "message": "[XFRM]: Support to increment packet dropping statistics.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "558f82ef6e0d25e87f7468c07b6db1fbbf95a855",
      "tree": "b2fe20926ca4e500b6e5c0232a5bf3b2e3ba898e",
      "parents": [
        "9473e1f631de339c50bde1e3bd09e1045fe90fd5"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Thu Dec 20 20:42:57 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:38 2008 -0800"
      },
      "message": "[XFRM]: Define packet dropping statistics.\n\nThis statistics is shown factor dropped by transformation\nat /proc/net/xfrm_stat for developer.\nIt is a counter designed from current transformation source code\nand defined as linux private MIB.\n\nSee Documentation/networking/xfrm_proc.txt for the detail.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a1b051405bc16222d92c73b0c26d65b333a154ee",
      "tree": "2950e34bbb51838f8da3e1d03c8ee608d3b56f55",
      "parents": [
        "bd515c3e48ececd774eb3128e81b669dbbd32637"
      ],
      "author": {
        "name": "Masahide NAKAMURA",
        "email": "nakam@linux-ipv6.org",
        "time": "Thu Dec 20 20:41:12 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:36 2008 -0800"
      },
      "message": "[XFRM] IPv6: Fix dst/routing check at transformation.\n\nIPv6 specific thing is wrongly removed from transformation at net-2.6.25.\nThis patch recovers it with current design.\n\no Update \"path\" of xfrm_dst since IPv6 transformation should\n  care about routing changes. It is required by MIPv6 and\n  off-link destined IPsec.\no Rename nfheader_len which is for non-fragment transformation used by\n  MIPv6 to rt6i_nfheader_len as IPv6 name space.\n\nSigned-off-by: Masahide NAKAMURA \u003cnakam@linux-ipv6.org\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "910ef70aa301eb018255683499b8e51426c213a0",
      "tree": "ccde31a2c581c1f9ddea0c482f22ce72a9293f0e",
      "parents": [
        "33b8e776056202aceaf4c90f465d0f4ee53432ac"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Dec 18 22:14:25 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:59:13 2008 -0800"
      },
      "message": "[IPSEC]: Do xfrm_state_check_space before encapsulation\n\nWhile merging the IPsec output path I moved the encapsulation output\noperation to the top of the loop so that it sits outside of the locked\nsection.  Unfortunately in doing so it now sits in front of the space\ncheck as well which could be a fatal error.\n\nThis patch rearranges the calls so that the space check happens as\nthe thing on the output path.\n\nThis patch also fixes an incorrect goto should the encapsulation output\nfail.\n\nThanks to Kazunori MIYAZAWA for finding this bug.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4bda4f250d21c3e4f2a2da5f4cef829a434a4046",
      "tree": "2632bc368ceab622cf119ef5aee154617fe43f1c",
      "parents": [
        "5e41fb83216d370d158fe17675af82d12c6c72c9"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Fri Dec 14 11:38:04 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:58:07 2008 -0800"
      },
      "message": "[XFRM]: Fix potential race vs xfrm_state(only)_find and xfrm_hash_resize.\n\nThe _find calls calculate the hash value using the\nxfrm_state_hmask, without the xfrm_state_lock. But the\nvalue of this mask can change in the _resize call under\nthe state_lock, so we risk to fail in finding the desired\nentry in hash.\n\nI think, that the hash value is better to calculate\nunder the state lock.\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "aef21785995778f710a60b563e03bf53ba455a47",
      "tree": "5deeca8578e5b8d0198144b9dc2b281f8789a3df",
      "parents": [
        "cf86314cb7460423b0b7e611edad80a52dc90d10"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu Dec 13 09:30:59 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:54 2008 -0800"
      },
      "message": "[IPSEC]: Fix zero return value in xfrm_lookup on error\n\nFurther testing shows that my ICMP relookup patch can cause xfrm_lookup\nto return zero on error which isn\u0027t very nice since it leads to the caller\ndying on null pointer dereference.  The bug is due to not setting err\nto ENOENT just before we leave xfrm_lookup in case of no policy.\n\nThis patch moves the err setting to where it should be.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8b7817f3a959ed99d7443afc12f78a7e1fcc2063",
      "tree": "7e315dfbf5c77e67f6e7ad56f14eaddca621212b",
      "parents": [
        "d5422efe680fc55010c6ddca2370ca9548a96355"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Dec 12 10:44:43 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:23 2008 -0800"
      },
      "message": "[IPSEC]: Add ICMP host relookup support\n\nRFC 4301 requires us to relookup ICMP traffic that does not match any\npolicies using the reverse of its payload.  This patch implements this\nfor ICMP traffic that originates from or terminates on localhost.\n\nThis is activated on outbound with the new policy flag XFRM_POLICY_ICMP,\nand on inbound by the new state flag XFRM_STATE_ICMP.\n\nOn inbound the policy check is now performed by the ICMP protocol so\nthat it can repeat the policy check where necessary.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d5422efe680fc55010c6ddca2370ca9548a96355",
      "tree": "f72fa5eb779c8ae7d49688a9caac9b69a1f3bd58",
      "parents": [
        "815f4e57e9fc67456624ecde0515a901368c78d2"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Dec 12 10:44:16 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:22 2008 -0800"
      },
      "message": "[IPSEC]: Added xfrm_decode_session_reverse and xfrmX_policy_check_reverse\n\nRFC 4301 requires us to relookup ICMP traffic that does not match any\npolicies using the reverse of its payload.  This patch adds the functions\nxfrm_decode_session_reverse and xfrmX_policy_check_reverse so we can get\nthe reverse flow to perform such a lookup.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "815f4e57e9fc67456624ecde0515a901368c78d2",
      "tree": "a93d4c3922d9711a6d29d909c8d79694c931e2a4",
      "parents": [
        "3f71c81ac37b27b824e9ce18fe17438dc2af4a16"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Dec 12 10:36:59 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:21 2008 -0800"
      },
      "message": "[IPSEC]: Make xfrm_lookup flags argument a bit-field\n\nThis patch introduces an enum for bits in the flags argument of xfrm_lookup.\nThis is so that we can cram more information into it later.\n\nSince all current users use just the values 0 and 1, XFRM_LOOKUP_WAIT has\nbeen added with the value 1 \u003c\u003c 0 to represent the current meaning of flags.\n\nThe test in __xfrm_lookup has been changed accordingly.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "005011211f559113686938c2c252b8ee1ab855b5",
      "tree": "a126bc8cbbfa9a263e06cc517fe3c1ae6f31af59",
      "parents": [
        "385ac2e3f226c09cb71733df1899658e33a7850f"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Dec 11 01:53:43 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:57:05 2008 -0800"
      },
      "message": "[IPSEC]: Add xfrm_input_state helper\n\nThis patch adds the xfrm_input_state helper function which returns the\ncurrent xfrm state being processed on the input path given an sk_buff.\nThis is currently only used by xfrm_input but will be used by ESP upon\nasynchronous resumption.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "df01812eba19834e48abd43246abedfbc4feeb7e",
      "tree": "c178f29cca560d9549a1e1a7270b2d532316b058",
      "parents": [
        "0e3cf7e9164048b79e7375bd66c9ef350e5b5bd7"
      ],
      "author": {
        "name": "Denis Cheng",
        "email": "crquan@gmail.com",
        "time": "Fri Dec 07 00:51:11 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:56:54 2008 -0800"
      },
      "message": "[XFRM] net/xfrm/xfrm_state.c: use LIST_HEAD instead of LIST_HEAD_INIT\n\nsingle list_head variable initialized with LIST_HEAD_INIT could almost\nalways can be replaced with LIST_HEAD declaration, this shrinks the code\nand looks better.\n\nSigned-off-by: Denis Cheng \u003ccrquan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5a3e55d68ec5baac578bf32ba67607088c763657",
      "tree": "9e8f9dfae66c8a85735122ece8a9c85cdb5c31c4",
      "parents": [
        "b84a2189c4e1835c51fd6b974a0497be9bc4ba87"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Fri Dec 07 00:38:10 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:56:44 2008 -0800"
      },
      "message": "[NET]: Multiple namespaces in the all dst_ifdown routines.\n\nMove dst entries to a namespace loopback to catch refcounting leaks.\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2fcb45b6b87914f072314e5b5d9c196f45984683",
      "tree": "e5a6cc4101a8b2693799fde9f47abaf480ae2dfc",
      "parents": [
        "bbca17680f82b1ba3122d41e8bc675aebf6d1cf2"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Dec 03 22:54:12 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:55:49 2008 -0800"
      },
      "message": "[IPSEC]: Use the correct family for input state lookup\n\nWhen merging the input paths of IPsec I accidentally left a hard-coded\nAF_INET for the state lookup call.  This broke IPv6 obviously.  This\npatch fixes by getting the input callers to specify the family through\nskb-\u003ecb.\n\nCredit goes to Kazunori Miyazawa for diagnosing this and providing an\ninitial patch.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "875179fa60ffe2eba1daaefb0af1be97ff5eda6a",
      "tree": "cc691e83f8dc2e022299362da49673fb31c2de55",
      "parents": [
        "9108d5f4b2cd82f55ad178caa0be66a866a06dcc"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Sat Dec 01 23:27:18 2007 +1100"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:55:19 2008 -0800"
      },
      "message": "[IPSEC]: SPD auditing fix to include the netmask/prefix-length\n\nCurrently the netmask/prefix-length of an IPsec SPD entry is not included in\nany of the SPD related audit messages.  This can cause a problem when the\naudit log is examined as the netmask/prefix-length is vital in determining\nwhat network traffic is affected by a particular SPD entry.  This patch fixes\nthis problem by adding two additional fields, \"src_prefixlen\" and\n\"dst_prefixlen\", to the SPD audit messages to indicate the source and\ndestination netmasks.  These new fields are only included in the audit message\nwhen the netmask/prefix-length is less than the address length, i.e. the SPD\nentry applies to a network address and not a host address.\n\nExample audit message:\n\n type\u003dUNKNOWN[1415] msg\u003daudit(1196105849.752:25): auid\u003d0 \\\n   subj\u003droot:system_r:unconfined_t:s0-s0:c0.c1023 op\u003dSPD-add res\u003d1 \\\n   src\u003d192.168.0.0 src_prefixlen\u003d24 dst\u003d192.168.1.0 dst_prefixlen\u003d24\n\nIn addition, this patch also fixes a few other things in the\nxfrm_audit_common_policyinfo() function.  The IPv4 string formatting was\nconverted to use the standard NIPQUAD_FMT constant, the memcpy() was removed\nfrom the IPv6 code path and replaced with a typecast (the memcpy() was acting\nas a slow, implicit typecast anyway), and two local variables were created to\nmake referencing the XFRM security context and selector information cleaner.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "dcaee95a1b396f85cdc28099f39710be328d3a5e",
      "tree": "2408c1ad351b4a12c2ab2423cd854cc67f4f4da8",
      "parents": [
        "8512430e554a84275669f78f86dce18566d5cf7a"
      ],
      "author": {
        "name": "Joonwoo Park",
        "email": "joonwpark81@gmail.com",
        "time": "Mon Nov 26 23:23:21 2007 +0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:55:05 2008 -0800"
      },
      "message": "[IPSEC]: kmalloc + memset conversion to kzalloc\n\n2007/11/26, Patrick McHardy \u003ckaber@trash.net\u003e:\n\u003e How about also switching vmalloc/get_free_pages to GFP_ZERO\n\u003e and getting rid of the memset entirely while you\u0027re at it?\n\u003e\n\nxfrm_hash: kmalloc + memset conversion to kzalloc\nfix to avoid memset entirely.\n\nSigned-off-by: Joonwoo Park \u003cjoonwpark81@gmail.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "294b4baf292197e13d1df1d253efa7ac84ffee3f",
      "tree": "f7f4fc0fa51e937829e2702faffa78b913895f99",
      "parents": [
        "6e23ae2a48750bda407a4a58f52a4865d7308bf5"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Nov 14 01:57:47 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:55 2008 -0800"
      },
      "message": "[IPSEC]: Kill afinfo-\u003enf_post_routing\n\nAfter changeset:\n\n\t[NETFILTER]: Introduce NF_INET_ hook values\n\nIt always evaluates to NF_INET_POST_ROUTING.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1bf06cd2e338fd6fc29169d30eaf0df982338285",
      "tree": "351bf1c8e5063fdfb8c820470972169d398729fe",
      "parents": [
        "60d5fcfb19d8a958fc563e52240cd05ec23f36c9"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 19 18:50:17 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:54 2008 -0800"
      },
      "message": "[IPSEC]: Add async resume support on input\n\nThis patch adds support for async resumptions on input.  To do so, the\ntransform would return -EINPROGRESS and subsequently invoke the\nfunction xfrm_input_resume to resume processing.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "60d5fcfb19d8a958fc563e52240cd05ec23f36c9",
      "tree": "f1bb64a18b1b183ad1cdf84f88a42a0b643af720",
      "parents": [
        "d26f398400311982d2433debae85746c348b7d58"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 19 18:47:58 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:53 2008 -0800"
      },
      "message": "[IPSEC]: Remove nhoff from xfrm_input\n\nThe nhoff field isn\u0027t actually necessary in xfrm_input.  For tunnel\nmode transforms we now throw away the output IP header so it makes no\nsense to fill in the nexthdr field.  For transport mode we can now let\nthe function transport_finish do the setting and it knows where the\nnexthdr field is.\n\nThe only other thing that needs the nexthdr field to be set is the\nheader extraction code.  However, we can simply move the protocol\nextraction out of the generic header extraction.\n\nWe want to minimise the amount of info we have to carry around between\ntransforms as this simplifies the resumption process for async crypto.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d26f398400311982d2433debae85746c348b7d58",
      "tree": "cd1fd0dfbd5a51428dc92ea3dbbb864205a27fa8",
      "parents": [
        "0ebea8ef3559b545c37b016f44e84c3b33e47c39"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:47:08 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:52 2008 -0800"
      },
      "message": "[IPSEC]: Make x-\u003elastused an unsigned long\n\nCurrently x-\u003elastused is u64 which means that it cannot be\nread/written atomically on all architectures.  David Miller observed\nthat the value stored in it is only an unsigned long which is always\natomic.\n\nSo based on his suggestion this patch changes the internal\nrepresentation from u64 to unsigned long while the user-interface\nstill refers to it as u64.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0ebea8ef3559b545c37b016f44e84c3b33e47c39",
      "tree": "7a47787c1b830084ac2d36371490b9e2574e2472",
      "parents": [
        "668dc8af3150f837f7f0461001bbbc0ce25d7bdf"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:45:58 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:52 2008 -0800"
      },
      "message": "[IPSEC]: Move state lock into x-\u003etype-\u003einput\n\nThis patch releases the lock on the state before calling\nx-\u003etype-\u003einput.  It also adds the lock to the spots where they\u0027re\ncurrently needed.\n\nMost of those places (all except mip6) are expected to disappear with\nasync crypto.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "668dc8af3150f837f7f0461001bbbc0ce25d7bdf",
      "tree": "9ba3534a190bb69b3aebf24aaa4340685fe16539",
      "parents": [
        "b2aa5e9d43a38dcdfa0878ed750cf32f98460278"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Dec 16 15:55:02 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:51 2008 -0800"
      },
      "message": "[IPSEC]: Move integrity stat collection into xfrm_input\n\nSimilar to the moving out of the replay processing on the output, this\npatch moves the integrity stat collectin from x-\u003etype-\u003einput into\nxfrm_input.\n\nThis would eventually allow transforms such as AH/ESP to be lockless.\n\nThe error value EBADMSG (currently unused in the crypto layer) is used\nto indicate a failed integrity check.  In future this error can be\ndirectly returned by the crypto layer once we switch to aead\nalgorithms.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b2aa5e9d43a38dcdfa0878ed750cf32f98460278",
      "tree": "e00544bd1aa0ab6e2ccb0696e1a89cd4900130e9",
      "parents": [
        "716062fd4c2f88a33ab409f62a1e7397ad0a7e33"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:44:55 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:50 2008 -0800"
      },
      "message": "[IPSEC]: Store xfrm states in security path directly\n\nAs it is xfrm_input first collects a list of xfrm states on the stack\nbefore storing them in the packet\u0027s security path just before it\nreturns.  For async crypto, this construction presents an obstacle\nsince we may need to leave the loop after each transform.\n\nIn fact, it\u0027s much easier to just skip the stack completely and always\nstore to the security path.  This is proven by the fact that this\npatch actually shrinks the code.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "716062fd4c2f88a33ab409f62a1e7397ad0a7e33",
      "tree": "73f2618fe99bca3870a0dbdc35acf6466ab3b976",
      "parents": [
        "c6581a457e661b7070e484ad723bbf555b17aca2"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:44:23 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:50 2008 -0800"
      },
      "message": "[IPSEC]: Merge most of the input path\n\nAs part of the work on asynchronous cryptographic operations, we need\nto be able to resume from the spot where they occur.  As such, it\nhelps if we isolate them to one spot.\n\nThis patch moves most of the remaining family-specific processing into\nthe common input code.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c6581a457e661b7070e484ad723bbf555b17aca2",
      "tree": "8562bded99fdee996e6b147d938057caf154f25b",
      "parents": [
        "862b82c6f960cc61274d370aa78ce1112f92a83e"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:43:43 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:49 2008 -0800"
      },
      "message": "[IPSEC]: Add async resume support on output\n\nThis patch adds support for async resumptions on output.  To do so,\nthe transform would return -EINPROGRESS and subsequently invoke the\nfunction xfrm_output_resume to resume processing.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "862b82c6f960cc61274d370aa78ce1112f92a83e",
      "tree": "51e252e1525dd7d02a695d428890a4c37fae2442",
      "parents": [
        "ef76bc23ef2acf20c8f7f841a542d8ab74c827c6"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:43:11 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:48 2008 -0800"
      },
      "message": "[IPSEC]: Merge most of the output path\n\nAs part of the work on asynchrnous cryptographic operations, we need\nto be able to resume from the spot where they occur.  As such, it\nhelps if we isolate them to one spot.\n\nThis patch moves most of the remaining family-specific processing into\nthe common output code.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "227620e295090629fcb2c46ad3828222ab65438d",
      "tree": "534162a74628fdfa7a8201cb776a45ca07510e5b",
      "parents": [
        "36cf9acf93e8561d9faec24849e57688a81eb9c5"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:41:28 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:46 2008 -0800"
      },
      "message": "[IPSEC]: Separate inner/outer mode processing on input\n\nWith inter-family transforms the inner mode differs from the outer\nmode.  Attempting to handle both sides from the same function means\nthat it needs to handle both IPv4 and IPv6 which creates duplication\nand confusion.\n\nThis patch separates the two parts on the input path so that each\nfunction deals with one family only.\n\nIn particular, the functions xfrm4_extract_inut/xfrm6_extract_inut\nmoves the pertinent fields from the IPv4/IPv6 IP headers into a\nneutral format stored in skb-\u003ecb.  This is then used by the inner mode\ninput functions to modify the inner IP header.  In this way the input\nfunction no longer has to know about the outer address family.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a2deb6d26f16ed7bf787dbd6a58c5d7be47d8db3",
      "tree": "a8c1ef4007cd8d419aa8d8a218092b00dcd64757",
      "parents": [
        "e40b3286158565909692e5914ea4a11bdbcc68c8"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:39:38 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:44 2008 -0800"
      },
      "message": "[IPSEC]: Move x-\u003eouter_mode-\u003eoutput out of locked section\n\nRO mode is the only one that requires a locked output function.  So\nit\u0027s easier to move the lock into that function rather than requiring\neveryone else to run under the lock.\n\nIn particular, this allows us to move the size check into the output\nfunction without causing a potential dead-lock should the ICMP error\nsomehow hit the same SA on transmission.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "25ee3286dcbc830a833354bb1d15567956844813",
      "tree": "bb5597d9e148f363bf0bbcd1a7269b5f677f0103",
      "parents": [
        "66cdb3ca27323a92712d289fc5edc7841d74a139"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Dec 11 09:32:34 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:43 2008 -0800"
      },
      "message": "[IPSEC]: Merge common code into xfrm_bundle_create\n\nHalf of the code in xfrm4_bundle_create and xfrm6_bundle_create are\ncommon.  This patch extracts that logic and puts it into\nxfrm_bundle_create.  The rest of it are then accessed through afinfo.\n\nAs a result this fixes the problem with inter-family transforms where\nwe treat every xfrm dst in the bundle as if it belongs to the top\nfamily.\n\nThis patch also fixes a long-standing error-path bug where we may free\nthe xfrm states twice.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "66cdb3ca27323a92712d289fc5edc7841d74a139",
      "tree": "443c864e4cab413743c3ca755a50f8a5d0ec300d",
      "parents": [
        "f04e7e8d7f175c05bbde3ae748bf2541da53721d"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:37:28 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:42 2008 -0800"
      },
      "message": "[IPSEC]: Move flow construction into xfrm_dst_lookup\n\nThis patch moves the flow construction from the callers of\nxfrm_dst_lookup into that function.  It also changes xfrm_dst_lookup\nso that it takes an xfrm state as its argument instead of explicit\naddresses.\n\nThis removes any address-specific logic from the callers of\nxfrm_dst_lookup which is needed to correctly support inter-family\ntransforms.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "550ade8432a2a6fbfb48ba7018750b0e8c81e8d0",
      "tree": "092838fb75d0352858dc473f32a78d1bc1db05f3",
      "parents": [
        "0148894223740da4818d7f4e6f92cbb5481a25b8"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 13 21:33:01 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:36 2008 -0800"
      },
      "message": "[IPSEC]: Use dst-\u003eheader_len when resizing on output\n\nCurrently we use x-\u003eprops.header_len when resizing on output.\nHowever, if we\u0027re resizing at all we might as well go the whole hog\nand do it for the whole dst.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b24b8a247ff65c01b252025926fe564209fae4fc",
      "tree": "8a9e0ea1e24b4733d8b9433d41877659505e9da4",
      "parents": [
        "a92aa318b4b369091fd80433c80e62838db8bc1c"
      ],
      "author": {
        "name": "Pavel Emelyanov",
        "email": "xemul@openvz.org",
        "time": "Wed Jan 23 21:20:07 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jan 28 14:53:35 2008 -0800"
      },
      "message": "[NET]: Convert init_timer into setup_timer\n\nMany-many code in the kernel initialized the timer-\u003efunction\nand  timer-\u003edata together with calling init_timer(timer). There\nis already a helper for this. Use it for networking code.\n\nThe patch is HUGE, but makes the code 130 lines shorter\n(98 insertions(+), 228 deletions(-)).\n\nSigned-off-by: Pavel Emelyanov \u003cxemul@openvz.org\u003e\nAcked-by: Arnaldo Carvalho de Melo \u003cacme@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0f99be0d115a5716292c58dfdb20d2eddd0f3387",
      "tree": "a4c8fc6262add152fa7207e40a5f02b18c9bedde",
      "parents": [
        "2e3884b5b16795c03a7bf295797c1b2402885b88"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Tue Jan 08 23:39:06 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jan 08 23:39:06 2008 -0800"
      },
      "message": "[XFRM]: xfrm_algo_clone() allocates too much memory\n\nalg_key_len is the length in bits of the key, not in bytes.\n\nBest way to fix this is to move alg_len() function from net/xfrm/xfrm_user.c \nto include/net/xfrm.h, and to use it in xfrm_algo_clone()\n\nalg_len() is renamed to xfrm_alg_len() because of its global exposition.\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2d60abc2a937bf77575c3b8c83faeeb84a84e654",
      "tree": "ecabc0dd8bacbb1d3152251cdc1ac8274c7aed24",
      "parents": [
        "76975f8a3186dae501584d0155ea410464f62815"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Thu Jan 03 20:43:21 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jan 04 00:47:03 2008 -0800"
      },
      "message": "[XFRM]: Do not define km_migrate() if !CONFIG_XFRM_MIGRATE\n\nIn include/net/xfrm.h we find :\n\n#ifdef CONFIG_XFRM_MIGRATE\nextern int km_migrate(struct xfrm_selector *sel, u8 dir, u8 type,\n                      struct xfrm_migrate *m, int num_bundles);\n...\n#endif\n\nWe can also guard the function body itself in net/xfrm/xfrm_state.c\nwith same condition.\n\n(Problem spoted by sparse checker)\nmake C\u003d2 net/xfrm/xfrm_state.o\n...\nnet/xfrm/xfrm_state.c:1765:5: warning: symbol \u0027km_migrate\u0027 was not declared. Should it be static?\n...\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5951cab136d8b7e84696061dc2e69c402bc94f61",
      "tree": "c00828fa48d9d02f992da23619feaafef41498bb",
      "parents": [
        "f398035f2dec0a6150833b0bc105057953594edb"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Thu Dec 20 00:00:45 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Dec 20 00:00:45 2007 -0800"
      },
      "message": "[XFRM]: Audit function arguments misordered\n\nIn several places the arguments to the xfrm_audit_start() function are\nin the wrong order resulting in incorrect user information being\nreported.  This patch corrects this by pacing the arguments in the\ncorrect order.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9ab4c954ce2b2b3c485bee7e425fda05946893be",
      "tree": "111c1cd3b765d06fd42325b1904a2289297142a8",
      "parents": [
        "a18aa31b7774d8b36048e256a02d9d689533fc96"
      ],
      "author": {
        "name": "Paul Moore",
        "email": "paul.moore@hp.com",
        "time": "Wed Dec 12 11:10:16 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Dec 14 13:54:35 2007 -0800"
      },
      "message": "[XFRM]: Display the audited SPI value in host byte order.\n\nCurrently the IPsec protocol SPI values are written to the audit log in\nnetwork byte order which is different from almost all other values which\nare recorded in host byte order.  This patch corrects this inconsistency\nby writing the SPI values to the audit record in host byte order.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "75b8c133267053c9986a7c8db5131f0e7349e806",
      "tree": "264a44a1882196c894f1af84baf7fbba7698678c",
      "parents": [
        "3f03e387893ffa07a4d5dac96772f9db3221a185"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Dec 11 04:38:08 2007 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Dec 11 04:38:08 2007 -0800"
      },
      "message": "[IPSEC]: Fix potential dst leak in xfrm_lookup\n\nIf we get an error during the actual policy lookup we don\u0027t free the\noriginal dst while the caller expects us to always free the original\ndst in case of error.\n\nThis patch fixes that.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5e5234ff17ef98932688116025b30958bd28a940",
      "tree": "c14918fe21d01eeda770856aff55dc2363fd69a2",
      "parents": [
        "076931989fe96823a577259cc6bc205d7ec31754"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 00:50:31 2007 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Nov 30 00:50:31 2007 +1100"
      },
      "message": "[IPSEC]: Fix uninitialised dst warning in __xfrm_lookup\n\nAndrew Morton reported that __xfrm_lookup generates this warning:\n\nnet/xfrm/xfrm_policy.c: In function \u0027__xfrm_lookup\u0027:\nnet/xfrm/xfrm_policy.c:1449: warning: \u0027dst\u0027 may be used uninitialized in this function\n\nThis is because if policy-\u003eaction is of an unexpected value then dst will\nnot be initialised.  Of course, in practice this should never happen since\nthe input layer xfrm_user/af_key will filter out all illegal values.  But\nthe compiler doesn\u0027t know that of course.\n\nSo this patch fixes this by taking the conservative approach and treat all\nunknown actions the same as a blocking action.\n\nThanks to Andrew for finding this and providing an initial fix.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "5dba4797115c8fa05c1a4d12927a6ae0b33ffc41",
      "tree": "6f515e0e29352ff06887ceb272e106e87966f709",
      "parents": [
        "8a8037ac9dbe4eb20ce50aa20244faf77444f4a3"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue Nov 27 11:10:07 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Nov 27 11:10:07 2007 +0800"
      },
      "message": "[XFRM]: Fix leak of expired xfrm_states\n\nThe xfrm_timer calls __xfrm_state_delete, which drops the final reference\nmanually without triggering destruction of the state. Change it to use\nxfrm_state_put to add the state to the gc list when we\u0027re dropping the\nlast reference. The timer function may still continue to use the state\nsafely since the final destruction does a del_timer_sync().\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "8053fc3de720e1027d690f892ff7d7c1737fdd9d",
      "tree": "0437efa29587beb5ebb174c402f7954cfde2269a",
      "parents": [
        "7f9c33e515353ea91afc62341161fead19e78567"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 26 19:07:34 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Nov 26 19:07:34 2007 +0800"
      },
      "message": "[IPSEC]: Temporarily remove locks around copying of non-atomic fields\n\nThe change 050f009e16f908932070313c1745d09dc69fd62b\n\n\t[IPSEC]: Lock state when copying non-atomic fields to user-space\n\ncaused a regression.\n\nIngo Molnar reports that it causes a potential dead-lock found by the\nlock validator as it tries to take x-\u003elock within xfrm_state_lock while\nnumerous other sites take the locks in opposite order.\n\nFor 2.6.24, the best fix is to simply remove the added locks as that puts\nus back in the same state as we\u0027ve been in for years.  For later kernels\na proper fix would be to reverse the locking order for every xfrm state\nuser such that if x-\u003elock is taken together with xfrm_state_lock then\nit is to be taken within it.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "87ae9afdcada236d0a1b38ce2c465a65916961dc",
      "tree": "c885e589ff66daf4f860b19818228edb75b29530",
      "parents": [
        "013fb33972061ac65cdf3e1771267985e59deca1"
      ],
      "author": {
        "name": "Adrian Bunk",
        "email": "bunk@kernel.org",
        "time": "Tue Oct 30 10:35:04 2007 +0100"
      },
      "committer": {
        "name": "Jens Axboe",
        "email": "axboe@carl.home.kernel.dk",
        "time": "Fri Nov 02 08:47:06 2007 +0100"
      },
      "message": "cleanup asm/scatterlist.h includes\n\nNot architecture specific code should not #include \u003casm/scatterlist.h\u003e.\n\nThis patch therefore either replaces them with\n#include \u003clinux/scatterlist.h\u003e or simply removes them if they were\nunused.\n\nSigned-off-by: Adrian Bunk \u003cbunk@kernel.org\u003e\nSigned-off-by: Jens Axboe \u003cjens.axboe@oracle.com\u003e\n"
    },
    {
      "commit": "0e0940d4bb9b19c0a45c844a83e1d25686aaf433",
      "tree": "1644f6c36efe10a6e90f5e395d80564f8a9ba860",
      "parents": [
        "ed0e7e0ca370519d6f79d1093ee2890d4cdee744"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Oct 26 00:39:27 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Fri Oct 26 00:39:27 2007 -0700"
      },
      "message": "[IPSEC]: Fix scatterlist handling in skb_icv_walk().\n\nUse sg_init_one() and sg_init_table() as needed.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "642f149031d70415d9318b919d50b71e4724adbd",
      "tree": "e792ad29dedffc6756d55e9d63e18ada35515b4b",
      "parents": [
        "bd6dee6f30a0f6943df190b387b5f8fe98a848f3"
      ],
      "author": {
        "name": "Jens Axboe",
        "email": "jens.axboe@oracle.com",
        "time": "Wed Oct 24 11:20:47 2007 +0200"
      },
      "committer": {
        "name": "Jens Axboe",
        "email": "jens.axboe@oracle.com",
        "time": "Wed Oct 24 11:20:47 2007 +0200"
      },
      "message": "SG: Change sg_set_page() to take length and offset argument\n\nMost drivers need to set length and offset as well, so may as well fold\nthose three lines into one.\n\nAdd sg_assign_page() for those two locations that only needed to set\nthe page, where the offset/length is set outside of the function context.\n\nSigned-off-by: Jens Axboe \u003cjens.axboe@oracle.com\u003e\n"
    },
    {
      "commit": "b3b724f48c0c0ade1d5120744cc5c9a3e5193d08",
      "tree": "5f95a2acc5f1d1a25ce3d39af56ec38453fe783a",
      "parents": [
        "7aeacf982203fb4dea2f3434eefdc268cfd5d6d9"
      ],
      "author": {
        "name": "Heiko Carstens",
        "email": "heiko.carstens@de.ibm.com",
        "time": "Tue Oct 23 09:28:34 2007 +0200"
      },
      "committer": {
        "name": "Jens Axboe",
        "email": "jens.axboe@oracle.com",
        "time": "Tue Oct 23 09:49:27 2007 +0200"
      },
      "message": "net: fix xfrm build - missing scatterlist.h include\n\nnet/xfrm/xfrm_algo.c: In function \u0027skb_icv_walk\u0027:\nnet/xfrm/xfrm_algo.c:555: error: implicit declaration of function\n\u0027sg_set_page\u0027\nmake[2]: *** [net/xfrm/xfrm_algo.o] Error 1\n\nCc: David Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Heiko Carstens \u003cheiko.carstens@de.ibm.com\u003e\nSigned-off-by: Jens Axboe \u003cjens.axboe@oracle.com\u003e\n"
    },
    {
      "commit": "fa05f1286be25a8ce915c5dd492aea61126b3f33",
      "tree": "07d6d32733f3272d588410a64c0cfa25d794e3be",
      "parents": [
        "60c74f81933635bb4ccb4ee6f31909c51f5cd230"
      ],
      "author": {
        "name": "Jens Axboe",
        "email": "jens.axboe@oracle.com",
        "time": "Mon Oct 22 19:44:26 2007 +0200"
      },
      "committer": {
        "name": "Jens Axboe",
        "email": "jens.axboe@oracle.com",
        "time": "Mon Oct 22 21:19:56 2007 +0200"
      },
      "message": "Update net/ to use sg helpers\n\nSigned-off-by: Jens Axboe \u003cjens.axboe@oracle.com\u003e\n"
    },
    {
      "commit": "13996378e6585fb25e582afe7489bf52dde78deb",
      "tree": "4a1eb75c81a5a9d23c68f9818259f3b357dc8265",
      "parents": [
        "ca68145f16359f71cd62b2671aa3e8c58f45ef19"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Oct 17 21:35:51 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 17 21:35:51 2007 -0700"
      },
      "message": "[IPSEC]: Rename mode to outer_mode and add inner_mode\n\nThis patch adds a new field to xfrm states called inner_mode.  The existing\nmode object is renamed to outer_mode.\n\nThis is the first part of an attempt to fix inter-family transforms.  As it\nis we always use the outer family when determining which mode to use.  As a\nresult we may end up shoving IPv4 packets into netfilter6 and vice versa.\n\nWhat we really want is to use the inner family for the first part of outbound\nprocessing and the outer family for the second part.  For inbound processing\nwe\u0027d use the opposite pairing.\n\nI\u0027ve also added a check to prevent silly combinations such as transport mode\nwith inter-family transforms.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "17c2a42a24e1e8dd6aa7cea4f84e034ab1bfff31",
      "tree": "3ee494a16a43f575f8c4900deaab894b73b2953a",
      "parents": [
        "1bfcb10f670f5ff5e1d9f53e59680573524cb142"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Oct 17 21:33:12 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 17 21:33:12 2007 -0700"
      },
      "message": "[IPSEC]: Store afinfo pointer in xfrm_mode\n\nIt is convenient to have a pointer from xfrm_state to address-specific\nfunctions such as the output function for a family.  Currently the\naddress-specific policy code calls out to the xfrm state code to get\nthose pointers when we could get it in an easier way via the state\nitself.\n\nThis patch adds an xfrm_state_afinfo to xfrm_mode (since they\u0027re\naddress-specific) and changes the policy code to use it.  I\u0027ve also\nadded an owner field to do reference counting on the module providing\nthe afinfo even though it isn\u0027t strictly necessary today since IPv6\ncan\u0027t be unloaded yet.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1bfcb10f670f5ff5e1d9f53e59680573524cb142",
      "tree": "003b271a2c1e089ae6506d869b7a8c8f04dbde0a",
      "parents": [
        "aa5d62cc8777f733f8b59b5586c0a1989813189e"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Oct 17 21:31:50 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 17 21:31:50 2007 -0700"
      },
      "message": "[IPSEC]: Add missing BEET checks\n\nCurrently BEET mode does not reinject the packet back into the stack\nlike tunnel mode does.  Since BEET should behave just like tunnel mode\nthis is incorrect.\n\nThis patch fixes this by introducing a flags field to xfrm_mode that\ntells the IPsec code whether it should terminate and reinject the packet\nback into the stack.\n\nIt then sets the flag for BEET and tunnel mode.\n\nI\u0027ve also added a number of missing BEET checks elsewhere where we check\nwhether a given mode is a tunnel or not.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "aa5d62cc8777f733f8b59b5586c0a1989813189e",
      "tree": "e04d5c0032e7460031cb83162db64fc68244af3a",
      "parents": [
        "440725000cba0b1a68ca2df20124be3a5b7f7702"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Oct 17 21:31:12 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 17 21:31:12 2007 -0700"
      },
      "message": "[IPSEC]: Move type and mode map into xfrm_state.c\n\nThe type and mode maps are only used by SAs, not policies.  So it makes\nsense to move them from xfrm_policy.c into xfrm_state.c.  This also allows\nus to mark xfrm_get_type/xfrm_put_type/xfrm_get_mode/xfrm_put_mode as\nstatic.\n\nThe only other change I\u0027ve made in the move is to get rid of the casts\non the request_module call for types.  They\u0027re unnecessary because C\nwill promote them to ints anyway.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "440725000cba0b1a68ca2df20124be3a5b7f7702",
      "tree": "ae278e1b2b5aaed8f1e9d55e91c2913cde5ac653",
      "parents": [
        "7aa68cb90638ccc36559a936814e4c089892b3d9"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Oct 17 21:30:34 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 17 21:30:34 2007 -0700"
      },
      "message": "[IPSEC]: Fix length check in xfrm_parse_spi\n\nCurrently xfrm_parse_spi requires there to be 16 bytes for AH and ESP.\nIn contrived cases there may not actually be 16 bytes there since the\nrespective header sizes are less than that (8 and 12 currently).\n\nThis patch changes the test to use the actual header length instead of 16.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cd40b7d3983c708aabe3d3008ec64ffce56d33b0",
      "tree": "0d6fe9cfd2f03fdeee126e317d4bfb145afc458d",
      "parents": [
        "aed815601f3f95281ab3a01f7e2cbe1bd54285a0"
      ],
      "author": {
        "name": "Denis V. Lunev",
        "email": "den@openvz.org",
        "time": "Wed Oct 10 21:15:29 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 10 21:15:29 2007 -0700"
      },
      "message": "[NET]: make netlink user -\u003e kernel interface synchronious\n\nThis patch make processing netlink user -\u003e kernel messages synchronious.\nThis change was inspired by the talk with Alexey Kuznetsov about current\nnetlink messages processing. He says that he was badly wrong when introduced \nasynchronious user -\u003e kernel communication.\n\nThe call netlink_unicast is the only path to send message to the kernel\nnetlink socket. But, unfortunately, it is also used to send data to the\nuser.\n\nBefore this change the user message has been attached to the socket queue\nand sk-\u003esk_data_ready was called. The process has been blocked until all\npending messages were processed. The bad thing is that this processing\nmay occur in the arbitrary process context.\n\nThis patch changes nlk-\u003edata_ready callback to get 1 skb and force packet\nprocessing right in the netlink_unicast.\n\nKernel -\u003e user path in netlink_unicast remains untouched.\n\nEINTR processing for in netlink_run_queue was changed. It forces rtnl_lock\ndrop, but the process remains in the cycle until the message will be fully\nprocessed. So, there is no need to use this kludges now.\n\nSigned-off-by: Denis V. Lunev \u003cden@openvz.org\u003e\nAcked-by: Alexey Kuznetsov \u003ckuznet@ms2.inr.ac.ru\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b7c6538cd84f8072fad43bfce530f5bf695edbba",
      "tree": "e0ba79ffe7b79355985a45de9961b17a0462764f",
      "parents": [
        "050f009e16f908932070313c1745d09dc69fd62b"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:33:35 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:03 2007 -0700"
      },
      "message": "[IPSEC]: Move state lock into x-\u003etype-\u003eoutput\n\nThis patch releases the lock on the state before calling x-\u003etype-\u003eoutput.\nIt also adds the lock to the spots where they\u0027re currently needed.\n\nMost of those places (all except mip6) are expected to disappear with\nasync crypto.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "050f009e16f908932070313c1745d09dc69fd62b",
      "tree": "2176b8034065bf2e8b401865efcfaab912bb1997",
      "parents": [
        "68325d3b12ad5bce650c2883bb878257f197efff"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:31:47 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:02 2007 -0700"
      },
      "message": "[IPSEC]: Lock state when copying non-atomic fields to user-space\n\nThis patch adds locking so that when we\u0027re copying non-atomic fields such as\nlife-time or coaddr to user-space we don\u0027t get a partial result.\n\nFor af_key I\u0027ve changed every instance of pfkey_xfrm_state2msg apart from\nexpiration notification to include the keys and life-times.  This is in-line\nwith XFRM behaviour.\n\nThe actual cases affected are:\n\n* pfkey_getspi: No change as we don\u0027t have any keys to copy.\n* key_notify_sa:\n\t+ ADD/UPD: This wouldn\u0027t work otherwise.\n\t+ DEL: It can\u0027t hurt.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "68325d3b12ad5bce650c2883bb878257f197efff",
      "tree": "c6d15e03e017599b07742d0a8453e4ee8ee253e3",
      "parents": [
        "658b219e9379d75fbdc578b9630b598098471258"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:30:57 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:02 2007 -0700"
      },
      "message": "[XFRM] user: Move attribute copying code into copy_to_user_state_extra\n\nHere\u0027s a good example of code duplication leading to code rot.  The\nnotification patch did its own netlink message creation for xfrm states.\nIt duplicated code that was already in dump_one_state.  Guess what, the\nnext time (and the time after) when someone updated dump_one_state the\nnotification path got zilch.\n\nThis patch moves that code from dump_one_state to copy_to_user_state_extra\nand uses it in xfrm_notify_sa too.  Unfortunately whoever updates this\nstill needs to update xfrm_sa_len since the notification path wants to\nknow the exact size for allocation.\n\nAt least I\u0027ve added a comment saying so and if someone still forgest, we\u0027ll\nhave a WARN_ON telling us so.\n\nI also changed the security size calculation to use xfrm_user_sec_ctx since\nthat\u0027s what we actually put into the skb.  However it makes no practical\ndifference since it has the same size as xfrm_sec_ctx.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "658b219e9379d75fbdc578b9630b598098471258",
      "tree": "fe802c4e1ee6468a9c2558a5e529b2380845a003",
      "parents": [
        "75ba28c633952f7994a7117c98ae6515b58f8d30"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:29:52 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:01 2007 -0700"
      },
      "message": "[IPSEC]: Move common code into xfrm_alloc_spi\n\nThis patch moves some common code that conceptually belongs to the xfrm core\nfrom af_key/xfrm_user into xfrm_alloc_spi.\n\nIn particular, the spin lock on the state is now taken inside xfrm_alloc_spi.\nPreviously it also protected the construction of the response PF_KEY/XFRM\nmessages to user-space.  This is inconsistent as other identical constructions\nare not protected by the state lock.  This is bad because they in fact should\nbe protected but only in certain spots (so as not to hold the lock for too\nlong which may cause packet drops).\n\nThe SPI byte order conversion has also been moved.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "75ba28c633952f7994a7117c98ae6515b58f8d30",
      "tree": "5be5d5a366595d1bbbc4f890358c3405425ca6c5",
      "parents": [
        "007f0211a8872f32381f5d44becf8eb2f27f3c30"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:27:27 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:01 2007 -0700"
      },
      "message": "[IPSEC]: Remove gratuitous km wake-up events on ACQUIRE\n\nThere is no point in waking people up when creating/updating larval states\nbecause they\u0027ll just go back to sleep again as larval states by definition\ncannot be found by xfrm_state_find.\n\nWe should only wake them up when the larvals mature or die.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "007f0211a8872f32381f5d44becf8eb2f27f3c30",
      "tree": "9f6879726b6f016379368ebbde6ce3ec13faaa39",
      "parents": [
        "1ecafede835321ebdc396531245adc37d22366f7"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:25:59 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:55:00 2007 -0700"
      },
      "message": "[IPSEC]: Store IPv6 nh pointer in mac_header on output\n\nCurrent the x-\u003emode-\u003eoutput functions store the IPv6 nh pointer in the\nskb network header.  This is inconvenient because the network header then\nhas to be fixed up before the packet can leave the IPsec stack.  The mac\nheader field is unused on output so we can use that to store this instead.\n\nThis patch does that and removes the network header fix-up in xfrm_output.\n\nIt also uses ipv6_hdr where appropriate in the x-\u003etype-\u003eoutput functions.\n\nThere is also a minor clean-up in esp4 to make it use the same code as\nesp6 to help any subsequent effort to merge the two.\n\nLastly it kills two redundant skb_set_* statements in BEET that were\nsimply copied over from transport mode.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1ecafede835321ebdc396531245adc37d22366f7",
      "tree": "230419433b8a08b86abf8998da84652c66c3b20e",
      "parents": [
        "32f0c4cbe495d121c09ed14d9c84f9e1b9574415"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Oct 09 13:24:07 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:54:59 2007 -0700"
      },
      "message": "[IPSEC]: Remove bogus ref count in xfrm_secpath_reject\n\nConstructs of the form\n\n\txfrm_state_hold(x);\n\tfoo(x);\n\txfrm_state_put(x);\n\ntend to be broken because foo is either synchronous where this is totally\nunnecessary or if foo is asynchronous then the reference count is in the\nwrong spot.\n\nIn the case of xfrm_secpath_reject, the function is synchronous and therefore\nwe should just kill the reference count.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "45b17f48eaf5e5ff4202454985557b3240141caa",
      "tree": "00b0b9dc375899b5d1f8ee11f78ef5dcc9b1c2e1",
      "parents": [
        "cdf7e668d4327a33e11be04c4cb9bcc604eaaa0f"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Oct 08 17:27:19 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:54:56 2007 -0700"
      },
      "message": "[IPSEC]: Move RO-specific output code into xfrm6_mode_ro.c\n\nThe lastused update check in xfrm_output can be done just as well in\nthe mode output function which is specific to RO.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cdf7e668d4327a33e11be04c4cb9bcc604eaaa0f",
      "tree": "3ffa05d642ec702b73eb568894024b4787849faa",
      "parents": [
        "436a0a402203d5a47d2edf7e4dde6c08a7257983"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Oct 08 17:26:34 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:54:55 2007 -0700"
      },
      "message": "[IPSEC]: Unexport xfrm_replay_notify\n\nNow that the only callers of xfrm_replay_notify are in xfrm, we can remove\nthe export.\n\nThis patch also removes xfrm_aevent_doreplay since it\u0027s now called in just\none spot.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "436a0a402203d5a47d2edf7e4dde6c08a7257983",
      "tree": "b47e73326a2ff7dbf8ac3fbcb6c4acea5c06619d",
      "parents": [
        "83815dea47cf3e98ccbb6aecda08cba1ba91208f"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Oct 08 17:25:53 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:54:54 2007 -0700"
      },
      "message": "[IPSEC]: Move output replay code into xfrm_output\n\nThe replay counter is one of only two remaining things in the output code\nthat requires a lock on the xfrm state (the other being the crypto).  This\npatch moves it into the generic xfrm_output so we can remove the lock from\nthe transforms themselves.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "83815dea47cf3e98ccbb6aecda08cba1ba91208f",
      "tree": "6d728f3b26dc02685ec6c8eb5c08605adf9d2688",
      "parents": [
        "406ef77c893ebd882209be4e393d64b01fe72054"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Oct 08 17:25:08 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:54:54 2007 -0700"
      },
      "message": "[IPSEC]: Move xfrm_state_check into xfrm_output.c\n\nThe functions xfrm_state_check and xfrm_state_check_space are only used by\nthe output code in xfrm_output.c so we can move them over.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "406ef77c893ebd882209be4e393d64b01fe72054",
      "tree": "815d753889769b355fba7e648abef7ad1422559e",
      "parents": [
        "bc31d3b2c7d7f2a03721a05cb3c9a3ce8b1e2e5a"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Oct 08 17:16:30 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:54:53 2007 -0700"
      },
      "message": "[IPSEC]: Move common output code to xfrm_output\n\nMost of the code in xfrm4_output_one and xfrm6_output_one are identical so\nthis patch moves them into a common xfrm_output function which will live\nin net/xfrm.\n\nIn fact this would seem to fix a bug as on IPv4 we never reset the network\nheader after a transform which may upset netfilter later on.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2774c7aba6c97a2535be3309a2209770953780b3",
      "tree": "9327c795707f6d723c6395c31e1c060e70b5e0db",
      "parents": [
        "0cc217e16cb8ca8ef2544363571fce94259900e0"
      ],
      "author": {
        "name": "Eric W. Biederman",
        "email": "ebiederm@xmission.com",
        "time": "Wed Sep 26 22:10:56 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:52:49 2007 -0700"
      },
      "message": "[NET]: Make the loopback device per network namespace.\n\nThis patch makes loopback_dev per network namespace.  Adding\ncode to create a different loopback device for each network\nnamespace and adding the code to free a loopback device\nwhen a network namespace exits.\n\nThis patch modifies all users the loopback_dev so they\naccess it as init_net.loopback_dev, keeping all of the\ncode compiling and working.  A later pass will be needed to\nupdate the users to use something other than the initial network\nnamespace.\n\nSigned-off-by: Eric W. Biederman \u003cebiederm@xmission.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "de3cb747ffac5f2a4a6bb156e7e2fd5229e688e5",
      "tree": "fe79764b8093843934c9b9f82f573e7a92cef406",
      "parents": [
        "556829657397b9b05baec6691ead4e22ee8d1567"
      ],
      "author": {
        "name": "Daniel Lezcano",
        "email": "dlezcano@fr.ibm.com",
        "time": "Tue Sep 25 19:16:28 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:52:14 2007 -0700"
      },
      "message": "[NET]: Dynamically allocate the loopback device, part 1.\n\nThis patch replaces all occurences to the static variable\nloopback_dev to a pointer loopback_dev. That provides the\nmindless, trivial, uninteressting change part for the dynamic\nallocation for the loopback.\n\nSigned-off-by: Eric W. Biederman \u003cebiederm@xmission.com\u003e\nSigned-off-by: Daniel Lezcano \u003cdlezcano@fr.ibm.com\u003e\nAcked-By: Kirill Korotaev \u003cdev@sw.ru\u003e\nAcked-by: Benjamin Thery \u003cbenjamin.thery@bull.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0cfad07555312468296ea3bbbcdf99038f58678b",
      "tree": "a95c432bcafaf22e965dcaf27bfd4a61723d1d64",
      "parents": [
        "007e3936bdaaa012483c9fe06ca71c272458c710"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sun Sep 16 16:24:44 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:51:24 2007 -0700"
      },
      "message": "[NETLINK]: Avoid pointer in netlink_run_queue\n\nI was looking at Patrick\u0027s fix to inet_diag and it occured\nto me that we\u0027re using a pointer argument to return values\nunnecessarily in netlink_run_queue.  Changing it to return\nthe value will allow the compiler to generate better code\nsince the value won\u0027t have to be memory-backed.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b4b510290b056b86611757ce1175a230f1080f53",
      "tree": "7bd1d45855ac7457be6d50338c60751f19e436d9",
      "parents": [
        "e9dc86534051b78e41e5b746cccc291b57a3a311"
      ],
      "author": {
        "name": "Eric W. Biederman",
        "email": "ebiederm@xmission.com",
        "time": "Wed Sep 12 13:05:38 2007 +0200"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:49:09 2007 -0700"
      },
      "message": "[NET]: Support multiple network namespaces with netlink\n\nEach netlink socket will live in exactly one network namespace,\nthis includes the controlling kernel sockets.\n\nThis patch updates all of the existing netlink protocols\nto only support the initial network namespace.  Request\nby clients in other namespaces will get -ECONREFUSED.\nAs they would if the kernel did not have the support for\nthat netlink protocol compiled in.\n\nAs each netlink protocol is updated to be multiple network\nnamespace safe it can register multiple kernel sockets\nto acquire a presence in the rest of the network namespaces.\n\nThe implementation in af_netlink is a simple filter implementation\nat hash table insertion and hash table look up time.\n\nSigned-off-by: Eric W. Biederman \u003cebiederm@xmission.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e9dc86534051b78e41e5b746cccc291b57a3a311",
      "tree": "1cd4a1dde4c51b6311749428a22cc8a8f5436825",
      "parents": [
        "e730c15519d09ea528b4d2f1103681fa5937c0e6"
      ],
      "author": {
        "name": "Eric W. Biederman",
        "email": "ebiederm@xmission.com",
        "time": "Wed Sep 12 13:02:17 2007 +0200"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:49:09 2007 -0700"
      },
      "message": "[NET]: Make device event notification network namespace safe\n\nEvery user of the network device notifiers is either a protocol\nstack or a pseudo device.  If a protocol stack that does not have\nsupport for multiple network namespaces receives an event for a\ndevice that is not in the initial network namespace it quite possibly\ncan get confused and do the wrong thing.\n\nTo avoid problems until all of the protocol stacks are converted\nthis patch modifies all netdev event handlers to ignore events on\ndevices that are not in the initial network namespace.\n\nAs the rest of the code is made network namespace aware these\nchecks can be removed.\n\nSigned-off-by: Eric W. Biederman \u003cebiederm@xmission.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ab5f5e8b144e4c804ef3aa1ce08a9ca9f01187ce",
      "tree": "bf3915a618b29f507d882e9c665ed9d07e7c0765",
      "parents": [
        "d2e9117c7aa9544d910634e17e3519fd67155229"
      ],
      "author": {
        "name": "Joy Latten",
        "email": "latten@austin.ibm.com",
        "time": "Mon Sep 17 11:51:22 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:49:02 2007 -0700"
      },
      "message": "[XFRM]: xfrm audit calls\n\nThis patch modifies the current ipsec audit layer\nby breaking it up into purpose driven audit calls.\n\nSo far, the only audit calls made are when add/delete\nan SA/policy. It had been discussed to give each\nkey manager it\u0027s own calls to do this, but I found\nthere to be much redundnacy since they did the exact\nsame things, except for how they got auid and sid, so I\ncombined them. The below audit calls can be made by any\nkey manager. Hopefully, this is ok.\n\nSigned-off-by: Joy Latten \u003clatten@austin.ibm.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f7944fb1913130ae7858008af96e52a3a6b04118",
      "tree": "757d88e7c9ed3a423f27546e23104a8daee0a34b",
      "parents": [
        "3b26a9a655ee73a87071a9f6a1fdd5311e31d7c9"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Sat Aug 25 13:46:55 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:34 2007 -0700"
      },
      "message": "[XFRM] policy: Replace magic number with XFRM_POLICY_OUT\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fd21150a0fe10c504160db359a4eb425576f6e7d",
      "tree": "fb1c912e8cb1867216f30d0c34f3b1f5427896ac",
      "parents": [
        "15901a2746e6a2dbe03043609f1575c2bcf726e8"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Thu Sep 06 03:28:08 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:26 2007 -0700"
      },
      "message": "[XFRM] netlink: Inline attach_encap_tmpl(), attach_sec_ctx(), and attach_one_addr()\n\nThese functions are only used once and are a lot easier to understand if\ninlined directly into the function.\n\nFixes by Masahide NAKAMURA.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "15901a2746e6a2dbe03043609f1575c2bcf726e8",
      "tree": "94539e2063d37082002a108e3072e93c5d09cef1",
      "parents": [
        "5424f32e484b9697808bbc0c0088dc2ead018d4f"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 14:02:39 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:25 2007 -0700"
      },
      "message": "[XFRM] netlink: Remove dependency on rtnetlink\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5424f32e484b9697808bbc0c0088dc2ead018d4f",
      "tree": "91daf130e6816a7fc7bef89932e4df45fc26fec5",
      "parents": [
        "35a7aa08bf7863dbfdb0eb69122d8aeaedd52748"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 14:01:33 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:25 2007 -0700"
      },
      "message": "[XFRM] netlink: Use nlattr instead of rtattr\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "35a7aa08bf7863dbfdb0eb69122d8aeaedd52748",
      "tree": "50f9bbc59d77a5d55ecff851d27ae1af80f10491",
      "parents": [
        "fab448991df4ecca6c244e23982c70f7e715b864"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 14:00:40 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:24 2007 -0700"
      },
      "message": "[XFRM] netlink: Rename attribute array from xfrma[] to attrs[]\n\nIncreases readability a lot.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fab448991df4ecca6c244e23982c70f7e715b864",
      "tree": "f4f0dd583f2934da4bb4b1621dfebb03c9d6a5ba",
      "parents": [
        "cf5cb79f6946063b04be3df16dcaa781e48bdbef"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 13:59:43 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:23 2007 -0700"
      },
      "message": "[XFRM] netlink: Enhance indexing of the attribute array\n\nnlmsg_parse() puts attributes at array[type] so the indexing\nmethod can be simpilfied by removing the obscuring \"- 1\".\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cf5cb79f6946063b04be3df16dcaa781e48bdbef",
      "tree": "64471b7121109b91a76481a92f6b5c037e66c421",
      "parents": [
        "a7bd9a45c8c8901f800a461a4098ebae2b8a4b78"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 13:59:04 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:23 2007 -0700"
      },
      "message": "[XFRM] netlink: Establish an attribute policy\n\nAdds a policy defining the minimal payload lengths for all the attributes\nallowing for most attribute validation checks to be removed from in\nthe middle of the code path. Makes updates more consistent as many format\nerrors are recognised earlier, before any changes have been attempted.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a7bd9a45c8c8901f800a461a4098ebae2b8a4b78",
      "tree": "825a7864c856f3dceaa002143c6c4a63c031a35a",
      "parents": [
        "7deb2264909ec82ae4696dd73d8ffce6814c9114"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 13:58:18 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:22 2007 -0700"
      },
      "message": "[XFRM] netlink: Use nlmsg_parse() to parse attributes\n\nUses nlmsg_parse() to parse the attributes. This actually changes\nbehaviour as unknown attributes (type \u003e MAXTYPE) no longer cause\nan error. Instead unknown attributes will be ignored henceforth\nto keep older kernels compatible with more recent userspace tools.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7deb2264909ec82ae4696dd73d8ffce6814c9114",
      "tree": "bee682118f12c19c2cd8cbdfe89165a221bfdc77",
      "parents": [
        "cfbfd45a8c4c0c8dd8ed491caefdeffd94acf9e4"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 13:57:39 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:22 2007 -0700"
      },
      "message": "[XFRM] netlink: Use nlmsg_new() and type-safe size calculation helpers\n\nMoves all complex message size calculation into own inlined helper\nfunctions and makes use of the type-safe netlink interface.\n\nUsing nlmsg_new() simplifies the calculation itself as it takes care\nof the netlink header length by itself.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cfbfd45a8c4c0c8dd8ed491caefdeffd94acf9e4",
      "tree": "c027768fe0768e2b502260bdd2b93c9ddcdf785f",
      "parents": [
        "c26445acbc292ab0466407db6d3bdcc5cbe1d03b"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Wed Aug 22 13:57:04 2007 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Wed Oct 10 16:48:21 2007 -0700"
      },
      "message": "[XFRM] netlink: Clear up some of the CONFIG_XFRM_SUB_POLICY ifdef mess\n\nMoves all of the SUB_POLICY ifdefs related to the attribute size\ncalculation into a function.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    }
  ],
  "next": "c26445acbc292ab0466407db6d3bdcc5cbe1d03b"
}
