)]}'
{
  "log": [
    {
      "commit": "e0376d004307e2b882afcf9e73b2ed5b66d57aee",
      "tree": "763b8c26622864855b7bf664ff5f30a62cd7d8f3",
      "parents": [
        "15004cab947314ac0f2fd47169de95ce48bafb15",
        "7cb8a93968e395e40a72a50da0b6114e752304b4"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 14 13:29:20 2013 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 14 13:29:20 2013 -0500"
      },
      "message": "Merge branch \u0027master\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next\n\nSteffen Klassert says:\n\n\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n1) Remove a duplicated call to skb_orphan() in pf_key, from Cong Wang.\n\n2) Prepare xfrm and pf_key for algorithms without pf_key support,\n   from Jussi Kivilinna.\n\n3) Fix an unbalanced lock in xfrm_output_one(), from Li RongQing.\n\n4) Add an IPsec state resolution packet queue to handle\n   packets that are send before the states are resolved.\n\n5) xfrm4_policy_fini() is unused since 2.6.11, time to remove it.\n   From Michal Kubecek.\n\n6) The xfrm gc threshold was configurable just in the initial\n   namespace, make it configurable in all namespaces. From\n   Michal Kubecek.\n\n7) We currently can not insert policies with mark and mask\n   such that some flows would be matched from both policies.\n   Allow this if the priorities of these policies are different,\n   the one with the higher priority is used in this case.\n\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a0073fe18e718a1c815fe8b0120f1ac3c60284ba",
      "tree": "1f30d5f9415a90c5662376fd3e4c0420a431b9f1",
      "parents": [
        "fa8599db8f222fd9d351a640074377a841979187"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Feb 05 12:52:55 2013 +0100"
      },
      "committer": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Wed Feb 06 08:31:10 2013 +0100"
      },
      "message": "xfrm: Add a state resolution packet queue\n\nAs the default, we blackhole packets until the key manager resolves\nthe states. This patch implements a packet queue where IPsec packets\nare queued until the states are resolved. We generate a dummy xfrm\nbundle, the output routine of the returned route enqueues the packet\nto a per policy queue and arms a timer that checks for state resolution\nwhen dst_output() is called. Once the states are resolved, the packets\nare sent out of the queue. If the states are not resolved after some\ntime, the queue is flushed.\n\nThis patch keeps the defaut behaviour to blackhole packets as long\nas we have no states. To enable the packet queue the sysctl\nxfrm_larval_drop must be switched off.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\n"
    },
    {
      "commit": "7e50f84c94b82c3b2d23ac8878012b3b60ea0e96",
      "tree": "27bcbe4b323b19de578acd87361490a60e72a594",
      "parents": [
        "cdfa1fe5c0d4f2815acfe8cd7730a0b3d8d0a3e9"
      ],
      "author": {
        "name": "Jussi Kivilinna",
        "email": "jussi.kivilinna@mbnet.fi",
        "time": "Thu Jan 31 12:40:38 2013 +0200"
      },
      "committer": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Fri Feb 01 10:13:43 2013 +0100"
      },
      "message": "pf_key/xfrm_algo: prepare pf_key and xfrm_algo for new algorithms without pfkey support\n\nMark existing algorithms as pfkey supported and make pfkey only use algorithms\nthat have pfkey_supported set.\n\nSigned-off-by: Jussi Kivilinna \u003cjussi.kivilinna@mbnet.fi\u003e\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\n"
    },
    {
      "commit": "70e94e66aec255aff276397f5ed3f3626c548f1c",
      "tree": "f8a266b768f73394271a58a90b7d8375705079df",
      "parents": [
        "ff88b30c717f21dffba6784cae4d3287da16f6ef"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki / 吉藤英明",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Tue Jan 29 12:48:50 2013 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jan 29 22:58:40 2013 -0500"
      },
      "message": "xfrm: Convert xfrm_addr_cmp() to boolean xfrm_addr_equal().\n\nAll users of xfrm_addr_cmp() use its result as boolean.\nIntroduce xfrm_addr_equal() (which is equal to !xfrm_addr_cmp())\nand convert all users.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ff88b30c717f21dffba6784cae4d3287da16f6ef",
      "tree": "e7247eef942addb4210e3969b5655a6d43d753f6",
      "parents": [
        "07c2fecc363c8f94a0bd2fdf9b7209ec6f5a0ab5"
      ],
      "author": {
        "name": "YOSHIFUJI Hideaki / 吉藤英明",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Tue Jan 29 12:48:31 2013 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jan 29 22:58:40 2013 -0500"
      },
      "message": "xfrm: Use ipv6_addr_equal() where appropriate.\n\nSigned-off-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "02bfd8ecf5cf980ede53e30a903b102924fc32f4",
      "tree": "ec52772b6d3d31fdbdc88040dbfb90e897783aa8",
      "parents": [
        "7a9885b93bb623524468b37d04146d3422e099eb"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Nov 27 09:46:17 2012 +0100"
      },
      "committer": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon Jan 21 11:19:04 2013 +0100"
      },
      "message": "xfrm: Remove unused defines\n\nXFRM_REPLAY_SEQ, XFRM_REPLAY_OSEQ and XFRM_REPLAY_SEQ_MASK\nwere introduced years ago but actually never used.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\n"
    },
    {
      "commit": "703fb94ec58e0e8769380c2877a8a34aeb5b6c97",
      "tree": "57bb3948dfe46f9dcd36b92ec4112408c7d5cc73",
      "parents": [
        "a66fe1653f4e81c007a68ca975067432a42df05b"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Nov 13 08:52:24 2012 +0100"
      },
      "committer": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Nov 13 09:15:07 2012 +0100"
      },
      "message": "xfrm: Fix the gc threshold value for ipv4\n\nThe xfrm gc threshold value depends on ip_rt_max_size. This\nvalue was set to INT_MAX with the routing cache removal patch,\nso we start doing garbage collecting when we have INT_MAX/2\nIPsec routes cached. Fix this by going back to the static\nthreshold of 1024 routes.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\n"
    },
    {
      "commit": "aecdc33e111b2c447b622e287c6003726daa1426",
      "tree": "3e7657eae4b785e1a1fb5dfb225dbae0b2f0cfc6",
      "parents": [
        "a20acf99f75e49271381d65db097c9763060a1e8",
        "a3a6cab5ea10cca64d036851fe0d932448f2fe4f"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Oct 02 13:38:27 2012 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Oct 02 13:38:27 2012 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next\n\nPull networking changes from David Miller:\n\n 1) GRE now works over ipv6, from Dmitry Kozlov.\n\n 2) Make SCTP more network namespace aware, from Eric Biederman.\n\n 3) TEAM driver now works with non-ethernet devices, from Jiri Pirko.\n\n 4) Make openvswitch network namespace aware, from Pravin B Shelar.\n\n 5) IPV6 NAT implementation, from Patrick McHardy.\n\n 6) Server side support for TCP Fast Open, from Jerry Chu and others.\n\n 7) Packet BPF filter supports MOD and XOR, from Eric Dumazet and Daniel\n    Borkmann.\n\n 8) Increate the loopback default MTU to 64K, from Eric Dumazet.\n\n 9) Use a per-task rather than per-socket page fragment allocator for\n    outgoing networking traffic.  This benefits processes that have very\n    many mostly idle sockets, which is quite common.\n\n    From Eric Dumazet.\n\n10) Use up to 32K for page fragment allocations, with fallbacks to\n    smaller sizes when higher order page allocations fail.  Benefits are\n    a) less segments for driver to process b) less calls to page\n    allocator c) less waste of space.\n\n    From Eric Dumazet.\n\n11) Allow GRO to be used on GRE tunnels, from Eric Dumazet.\n\n12) VXLAN device driver, one way to handle VLAN issues such as the\n    limitation of 4096 VLAN IDs yet still have some level of isolation.\n    From Stephen Hemminger.\n\n13) As usual there is a large boatload of driver changes, with the scale\n    perhaps tilted towards the wireless side this time around.\n\nFix up various fairly trivial conflicts, mostly caused by the user\nnamespace changes.\n\n* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next: (1012 commits)\n  hyperv: Add buffer for extended info after the RNDIS response message.\n  hyperv: Report actual status in receive completion packet\n  hyperv: Remove extra allocated space for recv_pkt_list elements\n  hyperv: Fix page buffer handling in rndis_filter_send_request()\n  hyperv: Fix the missing return value in rndis_filter_set_packet_filter()\n  hyperv: Fix the max_xfer_size in RNDIS initialization\n  vxlan: put UDP socket in correct namespace\n  vxlan: Depend on CONFIG_INET\n  sfc: Fix the reported priorities of different filter types\n  sfc: Remove EFX_FILTER_FLAG_RX_OVERRIDE_IP\n  sfc: Fix loopback self-test with separate_tx_channels\u003d1\n  sfc: Fix MCDI structure field lookup\n  sfc: Add parentheses around use of bitfield macro arguments\n  sfc: Fix null function pointer in efx_sriov_channel_type\n  vxlan: virtual extensible lan\n  igmp: export symbol ip_mc_leave_group\n  netlink: add attributes to fdb interface\n  tg3: unconditionally select HWMON support when tg3 is enabled.\n  Revert \"net: ti cpsw ethernet: allow reading phy interface mode from DT\"\n  gre: fix sparse warning\n  ...\n"
    },
    {
      "commit": "437589a74b6a590d175f86cf9f7b2efcee7765e7",
      "tree": "37bf8635b1356d80ef002b00e84f3faf3d555a63",
      "parents": [
        "68d47a137c3bef754923bccf73fb639c9b0bbd5e",
        "72235465864d84cedb2d9f26f8e1de824ee20339"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Oct 02 11:11:09 2012 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Tue Oct 02 11:11:09 2012 -0700"
      },
      "message": "Merge branch \u0027for-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace\n\nPull user namespace changes from Eric Biederman:\n \"This is a mostly modest set of changes to enable basic user namespace\n  support.  This allows the code to code to compile with user namespaces\n  enabled and removes the assumption there is only the initial user\n  namespace.  Everything is converted except for the most complex of the\n  filesystems: autofs4, 9p, afs, ceph, cifs, coda, fuse, gfs2, ncpfs,\n  nfs, ocfs2 and xfs as those patches need a bit more review.\n\n  The strategy is to push kuid_t and kgid_t values are far down into\n  subsystems and filesystems as reasonable.  Leaving the make_kuid and\n  from_kuid operations to happen at the edge of userspace, as the values\n  come off the disk, and as the values come in from the network.\n  Letting compile type incompatible compile errors (present when user\n  namespaces are enabled) guide me to find the issues.\n\n  The most tricky areas have been the places where we had an implicit\n  union of uid and gid values and were storing them in an unsigned int.\n  Those places were converted into explicit unions.  I made certain to\n  handle those places with simple trivial patches.\n\n  Out of that work I discovered we have generic interfaces for storing\n  quota by projid.  I had never heard of the project identifiers before.\n  Adding full user namespace support for project identifiers accounts\n  for most of the code size growth in my git tree.\n\n  Ultimately there will be work to relax privlige checks from\n  \"capable(FOO)\" to \"ns_capable(user_ns, FOO)\" where it is safe allowing\n  root in a user names to do those things that today we only forbid to\n  non-root users because it will confuse suid root applications.\n\n  While I was pushing kuid_t and kgid_t changes deep into the audit code\n  I made a few other cleanups.  I capitalized on the fact we process\n  netlink messages in the context of the message sender.  I removed\n  usage of NETLINK_CRED, and started directly using current-\u003etty.\n\n  Some of these patches have also made it into maintainer trees, with no\n  problems from identical code from different trees showing up in\n  linux-next.\n\n  After reading through all of this code I feel like I might be able to\n  win a game of kernel trivial pursuit.\"\n\nFix up some fairly trivial conflicts in netfilter uid/git logging code.\n\n* \u0027for-linus\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace: (107 commits)\n  userns: Convert the ufs filesystem to use kuid/kgid where appropriate\n  userns: Convert the udf filesystem to use kuid/kgid where appropriate\n  userns: Convert ubifs to use kuid/kgid\n  userns: Convert squashfs to use kuid/kgid where appropriate\n  userns: Convert reiserfs to use kuid and kgid where appropriate\n  userns: Convert jfs to use kuid/kgid where appropriate\n  userns: Convert jffs2 to use kuid and kgid where appropriate\n  userns: Convert hpfs to use kuid and kgid where appropriate\n  userns: Convert btrfs to use kuid/kgid where appropriate\n  userns: Convert bfs to use kuid/kgid where appropriate\n  userns: Convert affs to use kuid/kgid wherwe appropriate\n  userns: On alpha modify linux_to_osf_stat to use convert from kuids and kgids\n  userns: On ia64 deal with current_uid and current_gid being kuid and kgid\n  userns: On ppc convert current_uid from a kuid before printing.\n  userns: Convert s390 getting uid and gid system calls to use kuid and kgid\n  userns: Convert s390 hypfs to use kuid and kgid where appropriate\n  userns: Convert binder ipc to use kuids\n  userns: Teach security_path_chown to take kuids and kgids\n  userns: Add user namespace support to IMA\n  userns: Convert EVM to deal with kuids and kgids in it\u0027s hmac computation\n  ...\n"
    },
    {
      "commit": "e1760bd5ffae8cb98cffb030ee8e631eba28f3d8",
      "tree": "4694a60b407c418bf7de4b97355dc3bd0e6c6559",
      "parents": [
        "ca57ec0f00c3f139c41bf6b0a5b9bcc95bbb2ad7"
      ],
      "author": {
        "name": "Eric W. Biederman",
        "email": "ebiederm@xmission.com",
        "time": "Mon Sep 10 22:39:43 2012 -0700"
      },
      "committer": {
        "name": "Eric W. Biederman",
        "email": "ebiederm@xmission.com",
        "time": "Mon Sep 17 18:08:54 2012 -0700"
      },
      "message": "userns: Convert the audit loginuid  to be a kuid\n\nAlways store audit loginuids in type kuid_t.\n\nPrint loginuids by converting them into uids in the appropriate user\nnamespace, and then printing the resulting uid.\n\nModify audit_get_loginuid to return a kuid_t.\n\nModify audit_set_loginuid to take a kuid_t.\n\nModify /proc/\u003cpid\u003e/loginuid on read to convert the loginuid into the\nuser namespace of the opener of the file.\n\nModify /proc/\u003cpid\u003e/loginud on write to convert the loginuid\nrom the user namespace of the opener of the file.\n\nCc: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\nCc: Eric Paris \u003ceparis@redhat.com\u003e\nCc: Paul Moore \u003cpaul@paul-moore.com\u003e ?\nCc: David Miller \u003cdavem@davemloft.net\u003e\nSigned-off-by: Eric W. Biederman \u003cebiederm@xmission.com\u003e\n"
    },
    {
      "commit": "b48b63a1f6e26b0dec2c9f1690396ed4bcb66903",
      "tree": "8d9ad227c3a7d35cd78d40ecaf9bf59375dbd21a",
      "parents": [
        "7f2e6a5d8608d0353b017a0fe15502307593734e",
        "3f0c3c8fe30c725c1264fb6db8cc4b69db3a658a"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Sep 15 11:43:53 2012 -0400"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Sep 15 11:43:53 2012 -0400"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net\n\nConflicts:\n\tnet/netfilter/nfnetlink_log.c\n\tnet/netfilter/xt_LOG.c\n\nRather easy conflict resolution, the \u0027net\u0027 tree had bug fixes to make\nsure we checked if a socket is a time-wait one or not and elide the\nlogging code if so.\n\nWhereas on the \u0027net-next\u0027 side we are calculating the UID and GID from\nthe creds using different interfaces due to the user namespace changes\nfrom Eric Biederman.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "15e473046cb6e5d18a4d0057e61d76315230382b",
      "tree": "893d2df5d46a6ce156933ac57a1398f0ad22b889",
      "parents": [
        "9f00d9776bc5beb92e8bfc884a7e96ddc5589e2e"
      ],
      "author": {
        "name": "Eric W. Biederman",
        "email": "ebiederm@xmission.com",
        "time": "Fri Sep 07 20:12:54 2012 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Sep 10 15:30:41 2012 -0400"
      },
      "message": "netlink: Rename pid to portid to avoid confusion\n\nIt is a frequent mistake to confuse the netlink port identifier with a\nprocess identifier.  Try to reduce this confusion by renaming fields\nthat hold port identifiers portid instead of pid.\n\nI have carefully avoided changing the structures exported to\nuserspace to avoid changing the userspace API.\n\nI have successfully built an allyesconfig kernel with this change.\n\nSigned-off-by: \"Eric W. Biederman\" \u003cebiederm@xmission.com\u003e\nAcked-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3b59df46a449ec9975146d71318c4777ad086744",
      "tree": "8ba7e6186ef90c4bffe553504c33f40054704f94",
      "parents": [
        "37159ef2c1ae1e696b24b260b241209a19f92c60"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Sep 04 00:03:29 2012 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Sep 04 14:09:45 2012 -0400"
      },
      "message": "xfrm: Workaround incompatibility of ESN and async crypto\n\nESN for esp is defined in RFC 4303. This RFC assumes that the\nsequence number counters are always up to date. However,\nthis is not true if an async crypto algorithm is employed.\n\nIf the sequence number counters are not up to date on sequence\nnumber check, we may incorrectly update the upper 32 bit of\nthe sequence number. This leads to a DOS.\n\nWe workaround this by comparing the upper sequence number,\n(used for authentication) with the upper sequence number\ncomputed after the async processing. We drop the packet\nif these numbers are different.\n\nTo do this, we introduce a recheck function that does this\ncheck in the ESN case.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1304a7343b30fc4f16045412efdbb4179a3d9255",
      "tree": "83d667ac4f62e30f70305ce4cc7e030e3465f92e",
      "parents": [
        "1d76efe1577b4323609b1bcbfafa8b731eda071a",
        "23dcfa61bac244e1200ff9ad19c6e9144dcb6bb5"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Aug 22 14:21:38 2012 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Aug 22 14:21:38 2012 -0700"
      },
      "message": "Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net\n"
    },
    {
      "commit": "9d7b0fc1ef1f17aff57c0dc9a59453d8fca255c3",
      "tree": "9007cdc51b1c61fa7b001140c2034a1dcfa5aae2",
      "parents": [
        "ae4d8cf299dbea4ce387a01da6f723c4050b31a7"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Aug 20 02:56:56 2012 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Aug 20 02:56:56 2012 -0700"
      },
      "message": "net: ipv6: fix oops in inet_putpeer()\n\nCommit 97bab73f (inet: Hide route peer accesses behind helpers.) introduced\na bug in xfrm6_policy_destroy(). The xfrm_dst\u0027s _rt6i_peer member is not\ninitialized, causing a false positive result from inetpeer_ptr_is_peer(),\nwhich in turn causes a NULL pointer dereference in inet_putpeer().\n\nPid: 314, comm: kworker/0:1 Not tainted 3.6.0-rc1+ #17 To Be Filled By O.E.M. To Be Filled By O.E.M./P4S800D-X\nEIP: 0060:[\u003cc03abf93\u003e] EFLAGS: 00010246 CPU: 0\nEIP is at inet_putpeer+0xe/0x16\nEAX: 00000000 EBX: f3481700 ECX: 00000000 EDX: 000dd641\nESI: f3481700 EDI: c05e949c EBP: f551def4 ESP: f551def4\n DS: 007b ES: 007b FS: 0000 GS: 00e0 SS: 0068\nCR0: 8005003b CR2: 00000070 CR3: 3243d000 CR4: 00000750\nDR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000\nDR6: ffff0ff0 DR7: 00000400\n f551df04 c0423de1 00000000 f3481700 f551df18 c038d5f7 f254b9f8 f551df28\n f34f85d8 f551df20 c03ef48d f551df3c c0396870 f30697e8 f24e1738 c05e98f4\n f5509540 c05cd2b4 f551df7c c0142d2b c043feb5 f5509540 00000000 c05cd2e8\n [\u003cc0423de1\u003e] xfrm6_dst_destroy+0x42/0xdb\n [\u003cc038d5f7\u003e] dst_destroy+0x1d/0xa4\n [\u003cc03ef48d\u003e] xfrm_bundle_flo_delete+0x2b/0x36\n [\u003cc0396870\u003e] flow_cache_gc_task+0x85/0x9f\n [\u003cc0142d2b\u003e] process_one_work+0x122/0x441\n [\u003cc043feb5\u003e] ? apic_timer_interrupt+0x31/0x38\n [\u003cc03967eb\u003e] ? flow_cache_new_hashrnd+0x2b/0x2b\n [\u003cc0143e2d\u003e] worker_thread+0x113/0x3cc\n\nFix by adding a init_dst() callback to struct xfrm_policy_afinfo to\nproperly initialize the dst\u0027s peer pointer.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "65e0736bc2ac314bd374e93c24dd0698ac5ee66d",
      "tree": "2cf89c8388186fe15ffb144e07d323fc216aa9f1",
      "parents": [
        "1f07b62f3205f6ed41759df2892eaf433bc051a1"
      ],
      "author": {
        "name": "Fan Du",
        "email": "fan.du@windriver.com",
        "time": "Wed Aug 15 10:13:47 2012 +0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Aug 15 15:13:30 2012 -0700"
      },
      "message": "xfrm: remove redundant parameter \"int dir\" in struct xfrm_mgr.acquire\n\nSematically speaking, xfrm_mgr.acquire is called when kernel intends to ask\nuser space IKE daemon to negotiate SAs with peers. IOW the direction will\n*always* be XFRM_POLICY_OUT, so remove int dir for clarity.\n\nSigned-off-by: Fan Du \u003cfan.du@windriver.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e3c0d04750751389d5116267f8cf4687444d9a50",
      "tree": "dfa831b0d4fc388da81ccc0f8f3ce4f62c3916f4",
      "parents": [
        "1485348d2424e1131ea42efc033cbd9366462b01"
      ],
      "author": {
        "name": "Fan Du",
        "email": "fdu@windriver.com",
        "time": "Mon Jul 30 21:43:54 2012 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Aug 02 00:19:17 2012 -0700"
      },
      "message": "Fix unexpected SA hard expiration after changing date\n\nAfter SA is setup, one timer is armed to detect soft/hard expiration,\nhowever the timer handler uses xtime to do the math. This makes hard\nexpiration occurs first before soft expiration after setting new date\nwith big interval. As a result new child SA is deleted before rekeying\nthe new one.\n\nSigned-off-by: Fan Du \u003cfdu@windriver.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "eb8637cd4a0d651cf4fcc1559231facee829a0ac",
      "tree": "b9e8259314c4967b9b89930fdb00186ab401444e",
      "parents": [
        "fcc24db5e8a75ed3ce2238f4ad1b3bef8634f7e1"
      ],
      "author": {
        "name": "Saurabh",
        "email": "saurabh.mohan@vyatta.com",
        "time": "Tue Jul 17 09:44:49 2012 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jul 18 09:36:12 2012 -0700"
      },
      "message": "net/ipv4: VTI support rx-path hook in xfrm4_mode_tunnel.\n\nIncorporated David and Steffen\u0027s comments.\nAdd hook for rx-path xfmr4_mode_tunnel for VTI tunnel module.\n\nSigned-off-by: Saurabh Mohan \u003csaurabh.mohan@vyatta.com\u003e\nReviewed-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1d1e34ddd48d27def2f324c1e3be16d460b16436",
      "tree": "79937379cbc0498cb3a611df4d14362dbe45f6cd",
      "parents": [
        "160c85f0e050d92c0e42321aab2ffc343594e1c0"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 27 21:57:03 2012 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 27 21:57:03 2012 -0700"
      },
      "message": "xfrm_user: Propagate netlink error codes properly.\n\nInstead of using a fixed value of \"-1\" or \"-EMSGSIZE\", propagate what\nthe nla_*() interfaces actually return.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "bc9b35ad41387379e0b1257b3171da0dca73562d",
      "tree": "958375afc01d7d7eba27cc54b7436d7d93502384",
      "parents": [
        "e87cc4728f0e2fb663e592a1141742b1d6c63256"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 15 15:04:57 2012 -0400"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 15 15:04:57 2012 -0400"
      },
      "message": "xfrm: Convert several xfrm policy match functions to bool.\n\nxfrm_selector_match\nxfrm_sec_ctx_match\n__xfrm4_selector_match\n__xfrm6_selector_match\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e545d71390b50a8dab75efb182a4adc3c2603962",
      "tree": "efc33986581ccdd5b28d06aab81997717d278ea9",
      "parents": [
        "9d83ba4b6c6625de038f03cee18dd7bd89cee69b"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Apr 01 21:04:21 2012 -0400"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Apr 02 04:33:45 2012 -0400"
      },
      "message": "xfrm: Stop using NLA_PUT*().\n\nThese macros contain a hidden goto, and are thus extremely error\nprone and make code hard to audit.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "946a720c814ff63a9e5c7755395bff080b931eae",
      "tree": "98c60fbbd1412c3e4c8b08be2103017593b5894c",
      "parents": [
        "5d74f1757001f5b9a7739c2a9053435e16ce516b"
      ],
      "author": {
        "name": "Rami Rosen",
        "email": "ramirose@gmail.com",
        "time": "Sat Feb 25 02:09:46 2012 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Feb 25 20:19:24 2012 -0500"
      },
      "message": "xfrm: remove unneeded method typedef declaration in net/xfrm.h.\n\nThe patch removes unneeded method typedef declaration (icv_update_fn_t\n) and the two struct declarations which appear in its prototype\n(struct hash_desc and struct scatterlist) in net/xfrm.h.\n\nSigned-off-by: Rami Rosen \u003cramirose@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4e3fd7a06dc20b2d8ec6892233ad2012968fe7b6",
      "tree": "da3fbec7672ac6b967dfa31cec6c88f468a57fa2",
      "parents": [
        "40ba84993d66469d336099c5af74c3da5b73e28d"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Mon Nov 21 03:39:03 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 22 16:43:32 2011 -0500"
      },
      "message": "net: remove ipv6_addr_copy()\n\nC assignment can handle struct in6_addr copying.\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "26bff940dd975499c6c47438d4395d7d215911e8",
      "tree": "7b6774138e3033d7ab6df080419740083caee2ae",
      "parents": [
        "3ee32fee65ef6a4a8a4188e913be7dd90ba9e058"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Tue Nov 22 06:46:02 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 22 15:27:18 2011 -0500"
      },
      "message": "xfrm: optimize ipv4 selector matching\n\nCurrent addr_match() is errh, under-optimized.\n\nCompiler doesn\u0027t know that memcmp() branch doesn\u0027t trigger for IPv4.\nAlso, pass addresses by value -- they fit into register.\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3c709f8fb43e07a0403bba4a8ca7ba00ab874994",
      "tree": "9efc1e2bf6930851f0224f525b6cde0f5297fa61",
      "parents": [
        "0074820978004cc484b132d7a9ce0df414660d9d",
        "9bbc052d5e63512b0ce4e201ea97e12fba9fda82"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed May 11 14:26:15 2011 -0400"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed May 11 14:26:58 2011 -0400"
      },
      "message": "Merge branch \u0027master\u0027 of master.kernel.org:/pub/scm/linux/kernel/git/davem/net-3.6\n\nConflicts:\n\tdrivers/net/benet/be_main.c\n"
    },
    {
      "commit": "43a4dea4c9d44baae38ddc14b9b6d86fde4c8b88",
      "tree": "af7ecb23077cf5b4ae1290f7d1ab5e901e7adb82",
      "parents": [
        "e14a599335427f81bbb0008963e59aa9c6449dce"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon May 09 19:36:38 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 10 15:03:34 2011 -0700"
      },
      "message": "xfrm: Assign the inner mode output function to the dst entry\n\nAs it is, we assign the outer modes output function to the dst entry\nwhen we create the xfrm bundle. This leads to two problems on interfamily\nscenarios. We might insert ipv4 packets into ip6_fragment when called\nfrom xfrm6_output. The system crashes if we try to fragment an ipv4\npacket with ip6_fragment. This issue was introduced with git commit\nad0081e4 (ipv6: Fragment locally generated tunnel-mode IPSec6 packets\nas needed). The second issue is, that we might insert ipv4 packets in\nnetfilter6 and vice versa on interfamily scenarios.\n\nWith this patch we assign the inner mode output function to the dst entry\nwhen we create the xfrm bundle. So xfrm4_output/xfrm6_output from the inner\nmode is used and the right fragmentation and netfilter functions are called.\nWe switch then to outer mode with the output_finish functions.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b71d1d426d263b0b6cb5760322efebbfc89d4463",
      "tree": "226ca7390bd6187ec9139d2ccedd26fd94d8e57a",
      "parents": [
        "5f8629c526b4f7e529a6d27bbd802c0dc7fcc357"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Fri Apr 22 04:53:02 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Apr 22 11:04:14 2011 -0700"
      },
      "message": "inet: constify ip headers and in6_addr\n\nAdd const qualifiers to structs iphdr, ipv6hdr and in6_addr pointers\nwhere possible, to make code intention more obvious.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "990078afbf90e0175e71da2df04595b99153514c",
      "tree": "ff61e3ab53f46ceca2ef280788982883b50cc669",
      "parents": [
        "5c04c819a20af40adb7d282199f4e34e14fa05c5"
      ],
      "author": {
        "name": "Michael Smith",
        "email": "msmith@cbnco.com",
        "time": "Thu Apr 07 04:51:51 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Apr 10 18:50:59 2011 -0700"
      },
      "message": "Disable rp_filter for IPsec packets\n\nThe reverse path filter interferes with IPsec subnet-to-subnet tunnels,\nespecially when the link to the IPsec peer is on an interface other than\nthe one hosting the default route.\n\nWith dynamic routing, where the peer might be reachable through eth0\ntoday and eth1 tomorrow, it\u0027s difficult to keep rp_filter enabled unless\nfake routes to the remote subnets are configured on the interface\ncurrently used to reach the peer.\n\nIPsec provides a much stronger anti-spoofing policy than rp_filter, so\nthis patch disables the rp_filter for packets with a security path.\n\nSigned-off-by: Michael Smith \u003cmsmith@cbnco.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "af2f464e326ebad57284cfdecb03f1606e89bbc7",
      "tree": "0b9f1e9918a47f49e1454a0df5e045a0d627050d",
      "parents": [
        "36ae0148dbb6b9e15d8f067bb7523fd2b765a6af"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Mon Mar 28 19:46:39 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 28 23:34:52 2011 -0700"
      },
      "message": "xfrm: Assign esn pointers when cloning a state\n\nWhen we clone a xfrm state we have to assign the replay_esn\nand the preplay_esn pointers to the state if we use the\nnew replay detection method. To this end, we add a\nxfrm_replay_clone() function that allocates memory for\nthe replay detection and takes over the necessary values\nfrom the original state.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a454f0ccefbfdbfc0e1aa8a5f8010af5e48b8845",
      "tree": "359fdf6dbff1494ffe3d5cc8861fb0c0b72cc831",
      "parents": [
        "0e24d34a5b95226cfc335817aefd9cf9744e5659"
      ],
      "author": {
        "name": "Wei Yongjun",
        "email": "yjwei@cn.fujitsu.com",
        "time": "Mon Mar 21 18:08:28 2011 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 21 18:08:28 2011 -0700"
      },
      "message": "xfrm: Fix initialize repl field of struct xfrm_state\n\nCommit \u0027xfrm: Move IPsec replay detection functions to a separate file\u0027\n  (9fdc4883d92d20842c5acea77a4a21bb1574b495)\nintroduce repl field to struct xfrm_state, and only initialize it\nunder SA\u0027s netlink create path, the other path, such as pf_key,\nipcomp/ipcomp6 etc, the repl field remaining uninitialize. So if\nthe SA is created by pf_key, any input packet with SA\u0027s encryption\nalgorithm will cause panic.\n\n    int xfrm_input()\n    {\n        ...\n        x-\u003erepl-\u003eadvance(x, seq);\n        ...\n    }\n\nThis patch fixed it by introduce new function __xfrm_init_state().\n\nPid: 0, comm: swapper Not tainted 2.6.38-next+ #14 Bochs Bochs\nEIP: 0060:[\u003cc078e5d5\u003e] EFLAGS: 00010206 CPU: 0\nEIP is at xfrm_input+0x31c/0x4cc\nEAX: dd839c00 EBX: 00000084 ECX: 00000000 EDX: 01000000\nESI: dd839c00 EDI: de3a0780 EBP: dec1de88 ESP: dec1de64\n DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068\nProcess swapper (pid: 0, ti\u003ddec1c000 task\u003dc09c0f20 task.ti\u003dc0992000)\nStack:\n 00000000 00000000 00000002 c0ba27c0 00100000 01000000 de3a0798 c0ba27c0\n 00000033 dec1de98 c0786848 00000000 de3a0780 dec1dea4 c0786868 00000000\n dec1debc c074ee56 e1da6b8c de3a0780 c074ed44 de3a07a8 dec1decc c074ef32\nCall Trace:\n [\u003cc0786848\u003e] xfrm4_rcv_encap+0x22/0x27\n [\u003cc0786868\u003e] xfrm4_rcv+0x1b/0x1d\n [\u003cc074ee56\u003e] ip_local_deliver_finish+0x112/0x1b1\n [\u003cc074ed44\u003e] ? ip_local_deliver_finish+0x0/0x1b1\n [\u003cc074ef32\u003e] NF_HOOK.clone.1+0x3d/0x44\n [\u003cc074ef77\u003e] ip_local_deliver+0x3e/0x44\n [\u003cc074ed44\u003e] ? ip_local_deliver_finish+0x0/0x1b1\n [\u003cc074ec03\u003e] ip_rcv_finish+0x30a/0x332\n [\u003cc074e8f9\u003e] ? ip_rcv_finish+0x0/0x332\n [\u003cc074ef32\u003e] NF_HOOK.clone.1+0x3d/0x44\n [\u003cc074f188\u003e] ip_rcv+0x20b/0x247\n [\u003cc074e8f9\u003e] ? ip_rcv_finish+0x0/0x332\n [\u003cc072797d\u003e] __netif_receive_skb+0x373/0x399\n [\u003cc0727bc1\u003e] netif_receive_skb+0x4b/0x51\n [\u003ce0817e2a\u003e] cp_rx_poll+0x210/0x2c4 [8139cp]\n [\u003cc072818f\u003e] net_rx_action+0x9a/0x17d\n [\u003cc0445b5c\u003e] __do_softirq+0xa1/0x149\n [\u003cc0445abb\u003e] ? __do_softirq+0x0/0x149\n\nSigned-off-by: Wei Yongjun \u003cyjwei@cn.fujitsu.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2cd084678fc1eb75aec4f7ae3d339d232c00ec61",
      "tree": "ac6413e56d1189f57bb0f84920dfa3257a11d3d2",
      "parents": [
        "97e15c3a8504ea39a209778d7dcdbdf440404a91"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Mar 08 00:09:51 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 13 20:22:31 2011 -0700"
      },
      "message": "xfrm: Add support for IPsec extended sequence numbers\n\nThis patch adds support for IPsec extended sequence numbers (esn)\nas defined in RFC 4303. The bits to manage the anti-replay window\nare based on a patch from Alex Badea.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9fdc4883d92d20842c5acea77a4a21bb1574b495",
      "tree": "87019e64093d90a4f2b42149231d0ad3a864c5f9",
      "parents": [
        "d212a4c29096484e5e83b5006e695add126260af"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Mar 08 00:08:32 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 13 20:22:30 2011 -0700"
      },
      "message": "xfrm: Move IPsec replay detection functions to a separate file\n\nTo support multiple versions of replay detection, we move the replay\ndetection functions to a separate file and make them accessible\nvia function pointers contained in the struct xfrm_replay.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1ce3644ade9c865c755bf0f6a4e109b7bb6eb60f",
      "tree": "14ce0727337a43d1fa28432d01189d1a5f4269c7",
      "parents": [
        "9736acf395d3608583a7be70f62800b494fa103c"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Mar 08 00:06:31 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 13 20:22:28 2011 -0700"
      },
      "message": "xfrm: Use separate low and high order bits of the sequence numbers in xfrm_skb_cb\n\nTo support IPsec extended sequence numbers, we split the\noutput sequence numbers of xfrm_skb_cb in low and high order 32 bits\nand we add the high order 32 bits to the input sequence numbers.\nAll users are updated accordingly.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9736acf395d3608583a7be70f62800b494fa103c",
      "tree": "ef7b50bb74a7e6a0d93f962cc7a4c98dd18c2caa",
      "parents": [
        "a5079d084f8be781aae8a635cab4b179cfea4ebd"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Tue Mar 08 00:05:43 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Mar 13 20:22:28 2011 -0700"
      },
      "message": "xfrm: Add basic infrastructure to support IPsec extended sequence numbers\n\nThis patch adds the struct xfrm_replay_state_esn which will be\nused to support IPsec extended sequence numbers and anti replay windows\nbigger than 32 packets. Also we add a function that returns the actual\nsize of the xfrm_replay_state_esn, a xfrm netlink atribute and a xfrm state\nflag for the use of extended sequence numbers.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7e1dc7b6f709dfc1a9ab4b320dbe723f45992693",
      "tree": "db3a0ae07fb469c7f809a448bc39563f98edfec5",
      "parents": [
        "2032656e76b5355151effdff14de4a1a58643915"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Mar 12 02:42:11 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Mar 12 15:08:52 2011 -0800"
      },
      "message": "net: Use flowi4 and flowi6 in xfrm layer.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6281dcc94a96bd73017b2baa8fa83925405109ef",
      "tree": "8deee4d66d256d10ea25f66520eb96b1fade1545",
      "parents": [
        "08704bcbf022786532b5f188935ab6619906049f"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Mar 12 00:43:55 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Mar 12 15:08:46 2011 -0800"
      },
      "message": "net: Make flowi ports AF dependent.\n\nCreate two sets of port member accessors, one set prefixed by fl4_*\nand the other prefixed by fl6_*\n\nThis will let us to create AF optimal flow instances.\n\nIt will work because every context in which we access the ports,\nwe have to be fully aware of which AF the flowi is anyways.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1d28f42c1bd4bb2363d88df74d0128b4da135b4a",
      "tree": "cb2e652fe79a2bc307e871bc2d3fa51cc8051e45",
      "parents": [
        "ca116922afa8cc5ad46b00c0a637b1cde5ca478a"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Mar 12 00:29:39 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Mar 12 15:08:44 2011 -0800"
      },
      "message": "net: Put flowi_* prefix on AF independent members of struct flowi\n\nI intend to turn struct flowi into a union of AF specific flowi\nstructs.  There will be a common structure that each variant includes\nfirst, much like struct sock_common.\n\nThis is the first step to move in that direction.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2774c131b1d19920b4587db1cfbd6f0750ad1f15",
      "tree": "3a0482c727cf4dcc046a211214f12459dcba8271",
      "parents": [
        "69ead7afdf6028184f713a77376ee26f8aaafdcd"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Mar 01 14:59:04 2011 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Mar 01 14:59:04 2011 -0800"
      },
      "message": "xfrm: Handle blackhole route creation via afinfo.\n\nThat way we don\u0027t have to potentially do this in every xfrm_lookup()\ncaller.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e3dfa389fd2c79526b4bbf295726b66d21001664",
      "tree": "003575ae5e6c28c68b57e45629950f07f6e5d8ca",
      "parents": [
        "a70486f0e669730bad6713063e3f59e2e870044f"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 27 23:20:19 2011 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 27 23:20:19 2011 -0800"
      },
      "message": "xfrm: Pass const xfrm_mark to xfrm_mark_put().\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a70486f0e669730bad6713063e3f59e2e870044f",
      "tree": "f502826e26c5605bb973c1cc0d7817074330e424",
      "parents": [
        "851586218f5d463bbd62af40dfa264c5e3539572"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 27 23:17:24 2011 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 27 23:17:24 2011 -0800"
      },
      "message": "xfrm: Pass const xfrm_address_t objects to xfrm_state_lookup* and xfrm_find_acq.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "851586218f5d463bbd62af40dfa264c5e3539572",
      "tree": "1d98d2364a24f33def247743e67cafb89bd9fed6",
      "parents": [
        "6f2f19ed955e62a6789495da512d510f26ad4885"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 27 23:07:02 2011 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 27 23:07:02 2011 -0800"
      },
      "message": "xfrm: Pass const arg to xfrm_alg_len and xfrm_alg_auth_len.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6f2f19ed955e62a6789495da512d510f26ad4885",
      "tree": "5373980e8561b2bc5fe32212c02b78177eee33b7",
      "parents": [
        "5a698af53fb85b92d6462939a2c75ec4c7233bb9"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 27 23:04:45 2011 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 27 23:04:45 2011 -0800"
      },
      "message": "xfrm: Pass name as const to xfrm_*_get_byname().\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "33765d06033cc4ba4d9ae6d3d606ef3f28773c1b",
      "tree": "339157eaabfc9659b264754a55b7e663c87658f7",
      "parents": [
        "1f673c5fe2eca9007e60d82186473aa94090ea4c"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 24 01:55:45 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 23 23:08:47 2011 -0800"
      },
      "message": "xfrm: Const\u0027ify xfrm_address_t args to xfrm_state_find.\n\nThis required a const\u0027ification in xfrm_init_tempstate() too.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f8848067caff97ce03ee9beef8b6dd5c70f7e736",
      "tree": "25999d454fde90d976638f83aafc843eef7eb787",
      "parents": [
        "21eddb5c1e972727fadec57d8c340dcf814d7902"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 24 01:42:28 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 23 23:07:45 2011 -0800"
      },
      "message": "xfrm: Const\u0027ify ptr args to xfrm_state_*_check and xfrm_state_kern.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "21eddb5c1e972727fadec57d8c340dcf814d7902",
      "tree": "85f772ba21b228b9c0cd062bf3e01d9b81f8b294",
      "parents": [
        "1786b3891c5d72803e48b990ebad4ac1b6fd9700"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 24 01:35:16 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 23 23:07:45 2011 -0800"
      },
      "message": "xfrm: Const\u0027ify xfrm_tmpl and xfrm_state args to xfrm_state_addr_cmp.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "63eb23f5d80d7158fa575aaca240cb8497e2c06f",
      "tree": "a140e16c39b25184292de5bc2dd5a490292ea72a",
      "parents": [
        "f299d557cb7fca4219020b19dab28ed26738c3ee"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 24 01:25:19 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 23 23:07:44 2011 -0800"
      },
      "message": "xfrm: Const\u0027ify policy arg to xp_net.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b4b7c0b389131c34b6c3a6bf3f3c4d17fe59155f",
      "tree": "4a197a5ba9993e67003a96f5de88bd61bdfd9680",
      "parents": [
        "5f803b58cd8528a93fbb72fa7b011547e7b1a310"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 24 00:35:06 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 23 23:07:42 2011 -0800"
      },
      "message": "xfrm: Const\u0027ify selector args in xfrm_migrate paths.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "183cad12785ffc036571c4b789dc084ec61a1bad",
      "tree": "85cdd5f0952b9404c24dcfae77f2f2158e19c8ad",
      "parents": [
        "dd701754e7d230330adc0e212b94106bbfd34841"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 24 00:28:01 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 23 23:07:41 2011 -0800"
      },
      "message": "xfrm: Const\u0027ify pointer args to km_migrate() and implementations.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6cc329610f2a1698576a2a8a94dbad8f82a66363",
      "tree": "9cb5e1ed53081a4ecf644ad2cbb5db8b4db2d579",
      "parents": [
        "ff6acd16825d59de3964b036183a5d214213b9a6"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 24 00:19:59 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 23 23:07:40 2011 -0800"
      },
      "message": "xfrm: Const\u0027ify address argument to xfrm_addr_any()\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ff6acd16825d59de3964b036183a5d214213b9a6",
      "tree": "f77ade3bbcfeaf3470c1395f9d5a0d49c9330145",
      "parents": [
        "6418c4e07991a7b405d86bd4579c670b50fec99d"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 24 00:19:13 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 23 23:07:39 2011 -0800"
      },
      "message": "xfrm: Const\u0027ify address arguments to xfrm_addr_cmp()\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5e6b930f21b0a442f9d5db97c8314b4d91be1c27",
      "tree": "035572d5908abe8092bae44befcc99720ab50a1b",
      "parents": [
        "200ce96e5601391a6d97c87067edf21fa94fb74e"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 24 00:14:45 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 23 23:07:38 2011 -0800"
      },
      "message": "xfrm: Const\u0027ify address arguments to -\u003edst_lookup()\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "200ce96e5601391a6d97c87067edf21fa94fb74e",
      "tree": "cda33247af56a5e4132668473629870a8236d707",
      "parents": [
        "19bd62441c36279ab33e311faebd357ef04ba344"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 24 00:12:25 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 23 23:07:38 2011 -0800"
      },
      "message": "xfrm: Const\u0027ify selector argument to xfrm_selector_match()\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "19bd62441c36279ab33e311faebd357ef04ba344",
      "tree": "d9666f25d4212876d7feb0d75303ac246c8846ef",
      "parents": [
        "214e005bc32c7045b8554f9f0fb07b3fcce2cd42"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 24 00:07:20 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 23 23:07:37 2011 -0800"
      },
      "message": "xfrm: Const\u0027ify tmpl and address arguments to -\u003einit_temprop()\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "214e005bc32c7045b8554f9f0fb07b3fcce2cd42",
      "tree": "19549e83718646b6ec942f9c4aaf8ce5645cb0d0",
      "parents": [
        "55ae22d08fc9b531bc8a88b7306004e7053bb425"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Feb 24 00:02:38 2011 -0500"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Feb 23 23:07:37 2011 -0800"
      },
      "message": "xfrm: Pass km_event pointers around as const when possible.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b520e9f616f4f29c8d2557ba704b74ce6d79ff07",
      "tree": "6d423a4be60b1c1a54cc5546843336b9f1c858c7",
      "parents": [
        "1a898592b2bde7b109e121ccb7498d40396fb5c7"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 18:24:19 2011 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 18:24:19 2011 -0800"
      },
      "message": "xfrm: Mark flowi arg to xfrm_state_find() const.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e1ad2ab2cf0cabcd81861e2c61870fc27bb27ded",
      "tree": "052495802067a0b1aa2513af867c57bb954c6fe3",
      "parents": [
        "1744a8fe09e5db7315a57da52fa7c1afa779cfa0"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 18:07:39 2011 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 18:07:39 2011 -0800"
      },
      "message": "xfrm: Mark flowi arg to xfrm_selector_match() const.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1744a8fe09e5db7315a57da52fa7c1afa779cfa0",
      "tree": "702f2f6442f60580c61226c93dd74c70ed00d8f8",
      "parents": [
        "8f029de281b26ec9fd5cd77294db1d35d9876f1a"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 18:02:12 2011 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 18:02:12 2011 -0800"
      },
      "message": "xfrm: Mark token args to addr_match() const.\n\nAlso, make it return a real bool.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8f029de281b26ec9fd5cd77294db1d35d9876f1a",
      "tree": "221eca1314cf4a9920b06143b4d08d370ea63b19",
      "parents": [
        "73e5ebb20f2809e2eb0b904448481e010c2599d7"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 17:59:59 2011 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 17:59:59 2011 -0800"
      },
      "message": "xfrm: Mark flowi arg to xfrm_type-\u003ereject() const.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "73e5ebb20f2809e2eb0b904448481e010c2599d7",
      "tree": "b41c044d23f9b488ac45d743cf1a0c9e9e90ca79",
      "parents": [
        "0c7b3eefb4ab8df245e94feb0d83c1c3450a3d87"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 17:51:44 2011 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 17:51:44 2011 -0800"
      },
      "message": "xfrm: Mark flowi arg to -\u003einit_tempsel() const.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0c7b3eefb4ab8df245e94feb0d83c1c3450a3d87",
      "tree": "895c8242220a1bbbdf0704bba009fb3a424af316",
      "parents": [
        "05d8402576c9c1b85bfc9e4f9d6a21c27ccbd5b1"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 17:48:57 2011 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 17:48:57 2011 -0800"
      },
      "message": "xfrm: Mark flowi arg to -\u003efill_dst() const.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "05d8402576c9c1b85bfc9e4f9d6a21c27ccbd5b1",
      "tree": "d3406de85a12ae45b75ef109bd8e991b119f55b9",
      "parents": [
        "e8a4e37716dbc964e1cd18bca1a62fbd11805c1d"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 17:47:10 2011 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 17:47:10 2011 -0800"
      },
      "message": "xfrm: Mark flowi arg to -\u003eget_tos() const.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e8a4e37716dbc964e1cd18bca1a62fbd11805c1d",
      "tree": "e194b7fba8a2e0e4168da5dc988c894bfb3502df",
      "parents": [
        "86fce3ba1e731cf6d97a4157a192ffa60dc7ec0b"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 17:42:56 2011 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 22 17:42:56 2011 -0800"
      },
      "message": "xfrm: Mark flowi arg const in key extraction helpers.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fa9921e46fd52b78070dc67ce0d27ec301a90410",
      "tree": "8684af3cd03cf8fed1e6be9f722c181278944f7b",
      "parents": [
        "c0c84ef5c130f8871adbdaac2ba824b9195cb6d9"
      ],
      "author": {
        "name": "Nicolas Dichtel",
        "email": "nicolas.dichtel@6wind.com",
        "time": "Wed Feb 02 06:29:02 2011 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Feb 08 14:00:40 2011 -0800"
      },
      "message": "ipsec: allow to align IPv4 AH on 32 bits\n\nThe Linux IPv4 AH stack aligns the AH header on a 64 bit boundary\n(like in IPv6). This is not RFC compliant (see RFC4302, Section\n3.3.3.2.1), it should be aligned on 32 bits.\n\nFor most of the authentication algorithms, the ICV size is 96 bits.\nThe AH header alignment on 32 or 64 bits gives the same results.\n\nHowever for SHA-256-128 for instance, the wrong 64 bit alignment results\nin adding useless padding in IPv4 AH, which is forbidden by the RFC.\n\nTo avoid breaking backward compatibility, we use a new flag\n(XFRM_STATE_ALIGN4) do change original behavior.\n\nInitial patch from Dang Hongwu \u003chongwu.dang@6wind.com\u003e and\nChristophe Gouault \u003cchristophe.gouault@6wind.com\u003e.\n\nSigned-off-by: Nicolas Dichtel \u003cnicolas.dichtel@6wind.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "35d2856b4693e8de5d616307b56cef296b839157",
      "tree": "ad267bf9f3312b2d64bec8b4912178577a8cb71e",
      "parents": [
        "957fca95e3521e471aac4c2e4cfbc21f399bdd84"
      ],
      "author": {
        "name": "Martin Willi",
        "email": "martin@strongswan.org",
        "time": "Wed Dec 08 04:37:49 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Dec 10 14:43:58 2010 -0800"
      },
      "message": "xfrm: Add Traffic Flow Confidentiality padding XFRM attribute\n\nThe XFRMA_TFCPAD attribute for XFRM state installation configures\nTraffic Flow Confidentiality by padding ESP packets to a specified\nlength.\n\nSigned-off-by: Martin Willi \u003cmartin@strongswan.org\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "aa285b1740f5b13e5a2606a927f3129954583d78",
      "tree": "4845acc70e17cbd0c3a16f490aa24e1a00e8eb3c",
      "parents": [
        "6a632625c7da7594d059b88dae0e9c591af147ba"
      ],
      "author": {
        "name": "Timo Teräs",
        "email": "timo.teras@iki.fi",
        "time": "Tue Nov 23 04:03:45 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Nov 28 11:22:17 2010 -0800"
      },
      "message": "xfrm: fix gre key endianess\n\nfl-\u003efl_gre_key is network byte order contrary to fl-\u003efl_icmp_*.\nMake xfrm_flowi_{s|d}port return network byte order values for gre\nkey too.\n\nSigned-off-by: Timo Teräs \u003ctimo.teras@iki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "cc9ff19da9bf76a2f70bcb80225a1c587c162e52",
      "tree": "181efcd617a42a48fa94c51cfe9dc0e77b3b5775",
      "parents": [
        "e1f2d8c2cc61d2b9472efe44e8a2b098336914b4"
      ],
      "author": {
        "name": "Timo Teräs",
        "email": "timo.teras@iki.fi",
        "time": "Wed Nov 03 04:41:38 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Nov 15 10:44:04 2010 -0800"
      },
      "message": "xfrm: use gre key as flow upper protocol info\n\nThe GRE Key field is intended to be used for identifying an individual\ntraffic flow within a tunnel. It is useful to be able to have XFRM\npolicy selector matches to have different policies for different\nGRE tunnels.\n\nSigned-off-by: Timo Teräs \u003ctimo.teras@iki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b33eab08445d86c3d0dec3111ce10df561328705",
      "tree": "381a37141d4da9cf6cb3a8c8c37c6363d856f8e4",
      "parents": [
        "e0ad61ec867fdd262804afa7a68e11fc9930c2b9"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Mon Oct 25 21:01:26 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 27 11:37:32 2010 -0700"
      },
      "message": "tunnels: add __rcu annotations\n\nAdd __rcu annotations to :\n        (struct ip_tunnel)-\u003eprl\n        (struct ip_tunnel_prl_entry)-\u003enext\n        (struct xfrm_tunnel)-\u003enext\n\tstruct xfrm_tunnel *tunnel4_handlers\n\tstruct xfrm_tunnel *tunnel64_handlers\n\nAnd use appropriate rcu primitives to reduce sparse warnings if\nCONFIG_SPARSE_RCU_POINTER\u003dy\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6f0bcf152582e7403155627a38e07bf3ef7f3cf5",
      "tree": "0dafb9ea61fa01bb8850ee2bcce97b98c23a7c8f",
      "parents": [
        "3cc77ec74e1583b50b8405114cdbd6b8ebb8c474"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Sun Oct 24 21:33:16 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Oct 25 13:09:45 2010 -0700"
      },
      "message": "tunnels: add _rcu annotations\n\n(struct ip6_tnl)-\u003enext is rcu protected :\n(struct ip_tunnel)-\u003enext is rcu protected :\n(struct xfrm6_tunnel)-\u003enext is rcu protected :\n\nadd __rcu annotation and proper rcu primitives.\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1c4c40c42da468ef02dc04940930c1926c964558",
      "tree": "3285bd36ab5ff41a24245e94e50016d5bf45bedf",
      "parents": [
        "8d8a0b1cc2a8f9794a3f1f747089b6a93774408d"
      ],
      "author": {
        "name": "stephen hemminger",
        "email": "shemminger@vyatta.com",
        "time": "Fri Oct 15 05:14:19 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 21 03:09:46 2010 -0700"
      },
      "message": "xfrm: make xfrm_bundle_ok local\n\nOnly used in one place.\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6f747aca5e61778190d1e27bdc469f49149f0230",
      "tree": "127de8b153a05437add3b959f10eea831466781e",
      "parents": [
        "191cc6877408348e90f4adb64726b60a93246b8b"
      ],
      "author": {
        "name": "stephen hemminger",
        "email": "shemminger@vyatta.com",
        "time": "Fri Oct 15 05:15:59 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Oct 21 03:09:45 2010 -0700"
      },
      "message": "xfrm6: make xfrm6_tunnel_free_spi local\n\nFunction only defined and used in one file.\n\nSigned-off-by: Stephen Hemminger \u003cshemminger@vyatta.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8444cf712c5f71845cba9dc30d8f530ff0d5ff83",
      "tree": "3283983551829eb3f985a92d49ec65ac8e487268",
      "parents": [
        "842c74bffcdb1d305ccd9e61e417cceae86b9963"
      ],
      "author": {
        "name": "Thomas Egerer",
        "email": "thomas.egerer@secunet.com",
        "time": "Mon Sep 20 11:11:38 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Sep 20 11:11:38 2010 -0700"
      },
      "message": "xfrm: Allow different selector family in temporary state\n\nThe family parameter xfrm_state_find is used to find a state matching a\ncertain policy. This value is set to the template\u0027s family\n(encap_family) right before xfrm_state_find is called.\nThe family parameter is however also used to construct a temporary state\nin xfrm_state_find itself which is wrong for inter-family scenarios\nbecause it produces a selector for the wrong family. Since this selector\nis included in the xfrm_user_acquire structure, user space programs\nmisinterpret IPv6 addresses as IPv4 and vice versa.\nThis patch splits up the original init_tempsel function into a part that\ninitializes the selector respectively the props and id of the temporary\nstate, to allow for differing ip address families whithin the state.\n\nSigned-off-by: Thomas Egerer \u003cthomas.egerer@secunet.com\u003e\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4efd7e833591721bec21cc4730a7f6261417840f",
      "tree": "9982ea86ad73f1142842070f4d9d1bf83ba318a0",
      "parents": [
        "d3ead2413cb99d3e6265577b12537434e229d8c2"
      ],
      "author": {
        "name": "Andreas Steffen",
        "email": "andreas.steffen@strongswan.org",
        "time": "Wed Jun 30 10:41:15 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 30 10:43:31 2010 -0700"
      },
      "message": "xfrm: fix XFRMA_MARK extraction in xfrm_mark_get\n\nDetermine the size of the xfrm_mark struct, not of its pointer.\n\nSigned-off-by: Andreas Steffen \u003candreas.steffen@strongswan.org\u003e\nAcked-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "871039f02f8ec4ab2e5e9010718caa8e085786f1",
      "tree": "f0d2b3127fc48c862967d68c46c2d46668137515",
      "parents": [
        "e4077e018b5ead3de9951fc01d8bf12eeeeeefed",
        "4a1032faac94ebbf647460ae3e06fc21146eb280"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Apr 11 14:53:53 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Apr 11 14:53:53 2010 -0700"
      },
      "message": "Merge branch \u0027master\u0027 of master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6\n\nConflicts:\n\tdrivers/net/stmmac/stmmac_main.c\n\tdrivers/net/wireless/wl12xx/wl1271_cmd.c\n\tdrivers/net/wireless/wl12xx/wl1271_main.c\n\tdrivers/net/wireless/wl12xx/wl1271_spi.c\n\tnet/core/ethtool.c\n\tnet/mac80211/scan.c\n"
    },
    {
      "commit": "e4077e018b5ead3de9951fc01d8bf12eeeeeefed",
      "tree": "f360f4ecacba17132c81ac37b6b737f1458f2d02",
      "parents": [
        "0a5bff744a6263d397f88671ed2f772da9c64989"
      ],
      "author": {
        "name": "Timo Teräs",
        "email": "timo.teras@iki.fi",
        "time": "Thu Apr 08 11:27:42 2010 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Apr 08 11:27:42 2010 -0700"
      },
      "message": "xfrm: Fix crashes in xfrm_lookup()\n\nFrom: Timo Teräs \u003ctimo.teras@iki.fi\u003e\n\nHappens because CONFIG_XFRM_SUB_POLICY is not enabled, and one of\nthe helper functions I used did unexpected things in that case.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "80c802f3073e84c956846e921e8a0b02dfa3755f",
      "tree": "895dc92dcf6b658d78838e0a23db3dd29c8be695",
      "parents": [
        "fe1a5f031e76bd8761a7803d75b95ee96e84a574"
      ],
      "author": {
        "name": "Timo Teräs",
        "email": "timo.teras@iki.fi",
        "time": "Wed Apr 07 00:30:05 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 07 03:43:19 2010 -0700"
      },
      "message": "xfrm: cache bundles instead of policies for outgoing flows\n\n__xfrm_lookup() is called for each packet transmitted out of\nsystem. The xfrm_find_bundle() does a linear search which can\nkill system performance depending on how many bundles are\nrequired per policy.\n\nThis modifies __xfrm_lookup() to store bundles directly in\nthe flow cache. If we did not get a hit, we just create a new\nbundle instead of doing slow search. This means that we can now\nget multiple xfrm_dst\u0027s for same flow (on per-cpu basis).\n\nSigned-off-by: Timo Teras \u003ctimo.teras@iki.fi\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fe1a5f031e76bd8761a7803d75b95ee96e84a574",
      "tree": "c74392cef02c1529b00df6c5d0b8f4239fe091c3",
      "parents": [
        "8020eb82d4c37d21dade0abeb8feed265a01819e"
      ],
      "author": {
        "name": "Timo Teräs",
        "email": "timo.teras@iki.fi",
        "time": "Wed Apr 07 00:30:04 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Apr 07 03:43:18 2010 -0700"
      },
      "message": "flow: virtualize flow cache entry methods\n\nThis allows to validate the cached object before returning it.\nIt also allows to destruct object properly, if the last reference\nwas held in flow cache. This is also a prepartion for caching\nbundles in the flow cache.\n\nIn return for virtualizing the methods, we save on:\n- not having to regenerate the whole flow cache on policy removal:\n  each flow matching a killed policy gets refreshed as the getter\n  function notices it smartly.\n- we do not have to call flow_cache_flush from policy gc, since the\n  flow cache now properly deletes the object if it had any references\n\nSigned-off-by: Timo Teras \u003ctimo.teras@iki.fi\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5a0e3ad6af8660be21ca98a971cd00f331318c05",
      "tree": "5bfb7be11a03176a87296a43ac6647975c00a1d1",
      "parents": [
        "ed391f4ebf8f701d3566423ce8f17e614cde9806"
      ],
      "author": {
        "name": "Tejun Heo",
        "email": "tj@kernel.org",
        "time": "Wed Mar 24 17:04:11 2010 +0900"
      },
      "committer": {
        "name": "Tejun Heo",
        "email": "tj@kernel.org",
        "time": "Tue Mar 30 22:02:32 2010 +0900"
      },
      "message": "include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h\n\npercpu.h is included by sched.h and module.h and thus ends up being\nincluded when building most .c files.  percpu.h includes slab.h which\nin turn includes gfp.h making everything defined by the two files\nuniversally available and complicating inclusion dependencies.\n\npercpu.h -\u003e slab.h dependency is about to be removed.  Prepare for\nthis change by updating users of gfp and slab facilities include those\nheaders directly instead of assuming availability.  As this conversion\nneeds to touch large number of source files, the following script is\nused as the basis of conversion.\n\n  http://userweb.kernel.org/~tj/misc/slabh-sweep.py\n\nThe script does the followings.\n\n* Scan files for gfp and slab usages and update includes such that\n  only the necessary includes are there.  ie. if only gfp is used,\n  gfp.h, if slab is used, slab.h.\n\n* When the script inserts a new include, it looks at the include\n  blocks and try to put the new include such that its order conforms\n  to its surrounding.  It\u0027s put in the include block which contains\n  core kernel includes, in the same order that the rest are ordered -\n  alphabetical, Christmas tree, rev-Xmas-tree or at the end if there\n  doesn\u0027t seem to be any matching order.\n\n* If the script can\u0027t find a place to put a new include (mostly\n  because the file doesn\u0027t have fitting include block), it prints out\n  an error message indicating which .h file needs to be added to the\n  file.\n\nThe conversion was done in the following steps.\n\n1. The initial automatic conversion of all .c files updated slightly\n   over 4000 files, deleting around 700 includes and adding ~480 gfp.h\n   and ~3000 slab.h inclusions.  The script emitted errors for ~400\n   files.\n\n2. Each error was manually checked.  Some didn\u0027t need the inclusion,\n   some needed manual addition while adding it to implementation .h or\n   embedding .c file was more appropriate for others.  This step added\n   inclusions to around 150 files.\n\n3. The script was run again and the output was compared to the edits\n   from #2 to make sure no file was left behind.\n\n4. Several build tests were done and a couple of problems were fixed.\n   e.g. lib/decompress_*.c used malloc/free() wrappers around slab\n   APIs requiring slab.h to be added manually.\n\n5. The script was run on all .h files but without automatically\n   editing them as sprinkling gfp.h and slab.h inclusions around .h\n   files could easily lead to inclusion dependency hell.  Most gfp.h\n   inclusion directives were ignored as stuff from gfp.h was usually\n   wildly available and often used in preprocessor macros.  Each\n   slab.h inclusion directive was examined and added manually as\n   necessary.\n\n6. percpu.h was updated not to include slab.h.\n\n7. Build test were done on the following configurations and failures\n   were fixed.  CONFIG_GCOV_KERNEL was turned off for all tests (as my\n   distributed build env didn\u0027t work with gcov compiles) and a few\n   more options had to be turned off depending on archs to make things\n   build (like ipr on powerpc/64 which failed due to missing writeq).\n\n   * x86 and x86_64 UP and SMP allmodconfig and a custom test config.\n   * powerpc and powerpc64 SMP allmodconfig\n   * sparc and sparc64 SMP allmodconfig\n   * ia64 SMP allmodconfig\n   * s390 SMP allmodconfig\n   * alpha SMP allmodconfig\n   * um on x86_64 SMP allmodconfig\n\n8. percpu.h modifications were reverted so that it could be applied as\n   a separate patch and serve as bisection point.\n\nGiven the fact that I had only a couple of failures from tests on step\n6, I\u0027m fairly confident about the coverage of this conversion patch.\nIf there is a breakage, it\u0027s likely to be something in one of the arch\nheaders which should be easily discoverable easily on most builds of\nthe specific arch.\n\nSigned-off-by: Tejun Heo \u003ctj@kernel.org\u003e\nGuess-its-ok-by: Christoph Lameter \u003ccl@linux-foundation.org\u003e\nCc: Ingo Molnar \u003cmingo@redhat.com\u003e\nCc: Lee Schermerhorn \u003cLee.Schermerhorn@hp.com\u003e\n"
    },
    {
      "commit": "87c1e12b5eeb7b30b4b41291bef8e0b41fc3dde9",
      "tree": "4e30c4d60c21ab5e0346648ed852258a96265288",
      "parents": [
        "3a5b27bf6f29574d667230c7e76e4b83fe3014e0"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Mar 02 02:51:56 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Mar 03 01:04:37 2010 -0800"
      },
      "message": "ipsec: Fix bogus bundle flowi\n\nWhen I merged the bundle creation code, I introduced a bogus\nflowi value in the bundle.  Instead of getting from the caller,\nit was instead set to the flow in the route object, which is\ntotally different.\n\nThe end result is that the bundles we created never match, and\nwe instead end up with an ever growing bundle list.\n\nThanks to Jamal for find this problem.\n\nReported-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nAcked-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nAcked-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8ca2e93b557f2a0b35f7769038abf600177e1122",
      "tree": "2b25012de07a48c33db0a191924d6e5fcc99c22a",
      "parents": [
        "3d6acfa7641fd0a35f608b142f61e79f7ed8db43"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Mon Feb 22 11:32:57 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 22 16:21:12 2010 -0800"
      },
      "message": "xfrm: SP lookups signature with mark\n\npass mark to all SP lookups to prepare them for when we add code\nto have them search.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "bd55775c8dd656fc69b3a42a1c4ab32abb7e8af9",
      "tree": "766b30d5fc29d5d4849a10a290db51fe0f7c3ad7",
      "parents": [
        "bf825f81b454fae2ffe1b675f3a549656726440e"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Mon Feb 22 16:20:22 2010 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 22 16:20:22 2010 -0800"
      },
      "message": "xfrm: SA lookups signature with mark\n\npass mark to all SA lookups to prepare them for when we add code\nto have them search.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "bf825f81b454fae2ffe1b675f3a549656726440e",
      "tree": "8096391060484f831c0f2e4a7cef3448b4ff4845",
      "parents": [
        "7f6b9dbd5afbd966a82dcbafc5ed62305eb9d479"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Mon Feb 22 11:32:54 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 22 16:19:45 2010 -0800"
      },
      "message": "xfrm: introduce basic mark infrastructure\n\nAdd basic structuring and accessors for xfrm mark\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a63374631e7192a64648ecc6672619a7abf9ebcd",
      "tree": "b046b6dcbec6e995ccb87e91ac7458fe0d9b142a",
      "parents": [
        "c28e93040b497e895d5c41b54abef3bc8db17fa9"
      ],
      "author": {
        "name": "jamal",
        "email": "hadi@cyberus.ca",
        "time": "Tue Feb 09 13:21:17 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Feb 12 13:27:48 2010 -0800"
      },
      "message": "xfrm: use proper kernel types\n\nkernel side should use uxx instead of __uxx types\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a1664773907a2b69e2a3019598dcbeffa6bc724b",
      "tree": "77070892675e29de901587a4f55bbc620b20e211",
      "parents": [
        "e924960dacdf85d118a98c7262edf2f99c3015cf"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Mon Jan 25 10:37:54 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jan 28 06:31:05 2010 -0800"
      },
      "message": "netns xfrm: xfrm6_tunnel in netns\n\nI\u0027m not sure about rcu stuff near kmem cache destruction:\n* checks for non-empty hashes look bogus, they\u0027re done _before_\n  rcu_berrier()\n* unregistering netns ops is done before kmem_cache destoy\n  (as it should), and unregistering involves rcu barriers by itself\n\nSo it looks nothing should be done.\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e071041be037eca208b62b84469a06bdfc692bea",
      "tree": "c78506a4a582555959ffeb94980cb0cd7f86eab5",
      "parents": [
        "2ca4231de7f7a5fd7137bac152030ba71f15e8c3"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Sat Jan 23 13:37:10 2010 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jan 23 23:10:42 2010 -0800"
      },
      "message": "netns xfrm: fix \"ip xfrm state|policy count\" misreport\n\n\"ip xfrm state|policy count\" report SA/SP count from init_net,\nnot from netns of caller process.\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4447bb33f09444920a8f1d89e1540137429351b6",
      "tree": "0aeadd5f09b412380974d3155255ba8db27dd1ed",
      "parents": [
        "4e242d1616781f9f1f0b01abf878700b259cd8b5"
      ],
      "author": {
        "name": "Martin Willi",
        "email": "martin@strongswan.org",
        "time": "Wed Nov 25 00:29:52 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 25 15:48:38 2009 -0800"
      },
      "message": "xfrm: Store aalg in xfrm_state with a user specified truncation length\n\nAdding a xfrm_state requires an authentication algorithm specified\neither as xfrm_algo or as xfrm_algo_auth with a specific truncation\nlength. For compatibility, both attributes are dumped to userspace,\nand we also accept both attributes, but prefer the new syntax.\n\nIf no truncation length is specified, or the authentication algorithm\nis specified using xfrm_algo, the truncation length from the algorithm\ndescription in the kernel is used.\n\nSigned-off-by: Martin Willi \u003cmartin@strongswan.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9e0d57fd6dad37d72a3ca6db00ca8c76f2215454",
      "tree": "89693eb2e093da06e2228c12b43bde23e95049ad",
      "parents": [
        "7a50a240c495478179f01c9df4bd75e39cff79c7"
      ],
      "author": {
        "name": "Yury Polyanskiy",
        "email": "polyanskiy@gmail.com",
        "time": "Sun Nov 08 20:58:41 2009 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Nov 08 20:58:41 2009 -0800"
      },
      "message": "xfrm: SAD entries do not expire correctly after suspend-resume\n\n  This fixes the following bug in the current implementation of\nnet/xfrm: SAD entries timeouts do not count the time spent by the machine \nin the suspended state. This leads to the connectivity problems because \nafter resuming local machine thinks that the SAD entry is still valid, while \nit has already been expired on the remote server.\n\n  The cause of this is very simple: the timeouts in the net/xfrm are bound to \nthe old mod_timer() timers. This patch reassigns them to the\nCLOCK_REALTIME hrtimer.\n\n  I have been using this version of the patch for a few months on my\nmachines without any problems. Also run a few stress tests w/o any\nissues.\n\n  This version of the patch uses tasklet_hrtimer by Peter Zijlstra\n(commit 9ba5f0).\n\n  This patch is against 2.6.31.4. Please CC me.\n\nSigned-off-by: Yury Polyanskiy \u003cpolyanskiy@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fd2c3ef761fbc5e6c27fa7d40b30cda06bfcd7d8",
      "tree": "25922196160e9d5be8aa2a473ce981756926390f",
      "parents": [
        "4b7673a04a16f1d8faf1e367ae28a6ee1671843d"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Tue Nov 03 03:26:03 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Nov 04 05:06:25 2009 -0800"
      },
      "message": "net: cleanup include/net\n\nThis cleanup patch puts struct/union/enum opening braces,\nin first line to ease grep games.\n\nstruct something\n{\n\nbecomes :\n\nstruct something {\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "eb2ff967a587a4a784fd2390f38e324a5bec01ec",
      "tree": "63deb9023b47287a7fad08465f7c75a5c41e29fc",
      "parents": [
        "2ad9afbf5ca27482aa275de517261d56fd1e7ba0"
      ],
      "author": {
        "name": "Steffen Klassert",
        "email": "steffen.klassert@secunet.com",
        "time": "Wed Oct 07 22:50:40 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Oct 18 21:32:01 2009 -0700"
      },
      "message": "xfrm: remove skb_icv_walk\n\nThe last users of skb_icv_walk are converted to ahash now,\nso skb_icv_walk is unused and can be removed.\n\nSigned-off-by: Steffen Klassert \u003csteffen.klassert@secunet.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a33bc5c15154c835aae26f16e6a3a7d9ad4acb45",
      "tree": "cf7683b1b2d2fd170bfc6650ea84a4b9a81eebbf",
      "parents": [
        "9aada7ac047f789ffb27540cc1695989897b2dfe"
      ],
      "author": {
        "name": "Neil Horman",
        "email": "nhorman@tuxdriver.com",
        "time": "Thu Jul 30 18:52:15 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Jul 30 18:52:15 2009 -0700"
      },
      "message": "xfrm: select sane defaults for xfrm[4|6] gc_thresh\n\nChoose saner defaults for xfrm[4|6] gc_thresh values on init\n\nCurrently, the xfrm[4|6] code has hard-coded initial gc_thresh values\n(set to 1024).  Given that the ipv4 and ipv6 routing caches are sized\ndynamically at boot time, the static selections can be non-sensical.\nThis patch dynamically selects an appropriate gc threshold based on\nthe corresponding main routing table size, using the assumption that\nwe should in the worst case be able to handle as many connections as\nthe routing table can.\n\nFor ipv4, the maximum route cache size is 16 * the number of hash\nbuckets in the route cache.  Given that xfrm4 starts garbage\ncollection at the gc_thresh and prevents new allocations at 2 *\ngc_thresh, we set gc_thresh to half the maximum route cache size.\n\nFor ipv6, its a bit trickier.  there is no maximum route cache size,\nbut the ipv6 dst_ops gc_thresh is statically set to 1024.  It seems\nsane to select a simmilar gc_thresh for the xfrm6 code that is half\nthe number of hash buckets in the v6 route cache times 16 (like the v4\ncode does).\n\nSigned-off-by: Neil Horman \u003cnhorman@tuxdriver.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d5fdd6babcfc2b0e6a8da1acf492a69fb54b4c47",
      "tree": "e4ebdb5d6c4b1ddc16f83e701e3e6038c379a497",
      "parents": [
        "0cf08dcb78e8d61b6d4b2eb5cdb296d969971626"
      ],
      "author": {
        "name": "Brian Haley",
        "email": "brian.haley@hp.com",
        "time": "Tue Jun 23 04:31:07 2009 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jun 23 04:31:07 2009 -0700"
      },
      "message": "ipv6: Use correct data types for ICMPv6 type and code\n\nChange all the code that deals directly with ICMPv6 type and code\nvalues to use u8 instead of a signed int as that\u0027s the actual data\ntype.\n\nSigned-off-by: Brian Haley \u003cbrian.haley@hp.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "adf30907d63893e4208dfe3f5c88ae12bc2f25d5",
      "tree": "0f07542bb95de2ad537540868aba6cf87a86e17d",
      "parents": [
        "511c3f92ad5b6d9f8f6464be1b4f85f0422be91a"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "eric.dumazet@gmail.com",
        "time": "Tue Jun 02 05:19:30 2009 +0000"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Jun 03 02:51:04 2009 -0700"
      },
      "message": "net: skb-\u003edst accessors\n\nDefine three accessors to get/set dst attached to a skb\n\nstruct dst_entry *skb_dst(const struct sk_buff *skb)\n\nvoid skb_dst_set(struct sk_buff *skb, struct dst_entry *dst)\n\nvoid skb_dst_drop(struct sk_buff *skb)\nThis one should replace occurrences of :\ndst_release(skb-\u003edst)\nskb-\u003edst \u003d NULL;\n\nDelete skb-\u003edst field\n\nSigned-off-by: Eric Dumazet \u003ceric.dumazet@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b27aeadb5948d400df83db4d29590fb9862ba49d",
      "tree": "f76cc43150164facbb890e4d5c619a99fe6ce303",
      "parents": [
        "c68cd1a01ba56995d85a4a62b195b2b3f6415c64"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Tue Nov 25 18:00:48 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 25 18:00:48 2008 -0800"
      },
      "message": "netns xfrm: per-netns sysctls\n\nMake\n\tnet.core.xfrm_aevent_etime\n\tnet.core.xfrm_acq_expires\n\tnet.core.xfrm_aevent_rseqth\n\tnet.core.xfrm_larval_drop\n\nsysctls per-netns.\n\nFor that make net_core_path[] global, register it to prevent two\n/proc/net/core antries and change initcall position -- xfrm_init() is called\nfrom fs_initcall, so this one should be fs_initcall at least.\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c68cd1a01ba56995d85a4a62b195b2b3f6415c64",
      "tree": "69351005622aced7acf9085fa5c54134419286ba",
      "parents": [
        "59c9940ed0ef026673cac52f2eaed77af7d486da"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Tue Nov 25 18:00:14 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 25 18:00:14 2008 -0800"
      },
      "message": "netns xfrm: /proc/net/xfrm_stat in netns\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "59c9940ed0ef026673cac52f2eaed77af7d486da",
      "tree": "d7d4e38e693178f16000eaa5ae03f415f3197f7a",
      "parents": [
        "4fb236bac9fc7d51e2267866de6d4c30e549d2f8"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Tue Nov 25 17:59:52 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 25 17:59:52 2008 -0800"
      },
      "message": "netns xfrm: per-netns MIBs\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "fbda33b2b85941c1ae3a0d89522dec5c1b1bd98c",
      "tree": "f35036a6faf4fa549e45ff2b0407344e17cf9455",
      "parents": [
        "c5b3cf46eabe6e7459125fc6e2033b4222665017"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Tue Nov 25 17:56:49 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 25 17:56:49 2008 -0800"
      },
      "message": "netns xfrm: -\u003eget_saddr in netns\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c5b3cf46eabe6e7459125fc6e2033b4222665017",
      "tree": "a968ad567906d7b45270b9e91d534493f8a1a38d",
      "parents": [
        "db983c1144884cab10d6397532f4bf05eb0c01d2"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Tue Nov 25 17:51:25 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 25 17:51:25 2008 -0800"
      },
      "message": "netns xfrm: -\u003edst_lookup in netns\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "db983c1144884cab10d6397532f4bf05eb0c01d2",
      "tree": "ebb86abdaeb916191424407881d52635019502cf",
      "parents": [
        "7067802e262457a9737521e5669b622028b2283a"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Tue Nov 25 17:51:01 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 25 17:51:01 2008 -0800"
      },
      "message": "netns xfrm: KM reporting in netns\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7067802e262457a9737521e5669b622028b2283a",
      "tree": "f6f94b1429700979cb1407fc1f96de487f6bf085",
      "parents": [
        "fc34acd36eecdec95171b98ef2516e3d4daa5c41"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Tue Nov 25 17:50:36 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 25 17:50:36 2008 -0800"
      },
      "message": "netns xfrm: pass netns with KM notifications\n\nSA and SPD flush are executed with NULL SA and SPD respectively, for\nthese cases pass netns explicitly from userspace socket.\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a6483b790f8efcd8db190c1c0ff93f9d9efe919a",
      "tree": "e05ba1d3e7014409a69d878bf9f24c5eb93365e4",
      "parents": [
        "bd235e3cfff617ff91677da553714051866ba55f"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Tue Nov 25 17:38:20 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 25 17:38:20 2008 -0800"
      },
      "message": "netns xfrm: per-netns NETLINK_XFRM socket\n\nStub senders to init_net\u0027s one temporarily.\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ddcfd79680c1dc74eb5f24aa70785c11bf7eec8f",
      "tree": "f1d762f6b1cf6bcec289fe558a26dcb4e37ffb29",
      "parents": [
        "3dd0b4997a1d4f3a3666e400cc75b0279ce96849"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Tue Nov 25 17:37:23 2008 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 25 17:37:23 2008 -0800"
      },
      "message": "netns xfrm: dst garbage-collecting in netns\n\nPass netns pointer to struct xfrm_policy_afinfo::garbage_collect()\n\n\t[This needs more thoughts on what to do with dst_ops]\n\t[Currently stub to init_net]\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    }
  ],
  "next": "99a66657b2f62ae8b2b1e6ffc6abed051e4561ca"
}
