)]}'
{
  "log": [
    {
      "commit": "6f68dc37759b1d6ff3b4d4a9d097605a09f8f043",
      "tree": "7d0be960b8c0ec5b947637a0650f1c639002103a",
      "parents": [
        "9dadaa19cb11a8db38072a92a3f95deab7a797fb"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Jun 08 23:58:52 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Jun 17 21:29:49 2006 -0700"
      },
      "message": "[NET]: Fix warnings after LSM-IPSEC changes.\n\nAssignment used as truth value in xfrm_del_sa()\nand xfrm_get_policy().\n\nWrong argument type declared for security_xfrm_state_delete()\nwhen SELINUX is disabled.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "c8c05a8eec6f1258f6d5cb71a44ee5dc1e989b63",
      "tree": "b4a04dd9e2b940cb5b2911fb67fbe49c5f8b3fbf",
      "parents": [
        "cec6f7f39c3db7d9f6091bf2f8fc8d520f372719"
      ],
      "author": {
        "name": "Catherine Zhang",
        "email": "cxzhang@watson.ibm.com",
        "time": "Thu Jun 08 23:39:49 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Jun 17 21:29:45 2006 -0700"
      },
      "message": "[LSM-IPsec]: SELinux Authorize\n\nThis patch contains a fix for the previous patch that adds security\ncontexts to IPsec policies and security associations.  In the previous\npatch, no authorization (besides the check for write permissions to\nSAD and SPD) is required to delete IPsec policies and security\nassocations with security contexts.  Thus a user authorized to change\nSAD and SPD can bypass the IPsec policy authorization by simply\ndeleteing policies with security contexts.  To fix this security hole,\nan additional authorization check is added for removing security\npolicies and security associations with security contexts.\n\nNote that if no security context is supplied on add or present on\npolicy to be deleted, the SELinux module allows the change\nunconditionally.  The hook is called on deletion when no context is\npresent, which we may want to change.  At present, I left it up to the\nmodule.\n\nLSM changes:\n\nThe patch adds two new LSM hooks: xfrm_policy_delete and\nxfrm_state_delete.  The new hooks are necessary to authorize deletion\nof IPsec policies that have security contexts.  The existing hooks\nxfrm_policy_free and xfrm_state_free lack the context to do the\nauthorization, so I decided to split authorization of deletion and\nmemory management of security data, as is typical in the LSM\ninterface.\n\nUse:\n\nThe new delete hooks are checked when xfrm_policy or xfrm_state are\ndeleted by either the xfrm_user interface (xfrm_get_policy,\nxfrm_del_sa) or the pfkey interface (pfkey_spddelete, pfkey_delete).\n\nSELinux changes:\n\nThe new policy_delete and state_delete functions are added.\n\nSigned-off-by: Catherine Zhang \u003ccxzhang@watson.ibm.com\u003e\nSigned-off-by: Trent Jaeger \u003ctjaeger@cse.psu.edu\u003e\nAcked-by: James Morris \u003cjmorris@namei.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b59f45d0b2878ab76f8053b0973654e6621828ee",
      "tree": "40dc5e2ede2620f7935fb3dae0d0eb199851f611",
      "parents": [
        "546be2405be119ef55467aace45f337a16e5d424"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat May 27 23:05:54 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Jun 17 21:28:39 2006 -0700"
      },
      "message": "[IPSEC] xfrm: Abstract out encapsulation modes\n\nThis patch adds the structure xfrm_mode.  It is meant to represent\nthe operations carried out by transport/tunnel modes.\n\nBy doing this we allow additional encapsulation modes to be added\nwithout clogging up the xfrm_input/xfrm_output paths.\n\nCandidate modes include 4-to-6 tunnel mode, 6-to-4 tunnel mode, and\nBEET modes.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "546be2405be119ef55467aace45f337a16e5d424",
      "tree": "9b09f0041f9f82a20ab25ace3c7360e4a4b7989f",
      "parents": [
        "9cb3528cdbffc513eb9fb8faa45d41e397355830"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat May 27 23:03:58 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Jun 17 21:28:37 2006 -0700"
      },
      "message": "[IPSEC] xfrm: Undo afinfo lock proliferation\n\nThe number of locks used to manage afinfo structures can easily be reduced\ndown to one each for policy and state respectively.  This is based on the\nobservation that the write locks are only held by module insertion/removal\nwhich are very rare events so there is no need to further differentiate\nbetween the insertion of modules like ipv6 versus esp6.\n\nThe removal of the read locks in xfrm4_policy.c/xfrm6_policy.c might look\nsuspicious at first.  However, after you realise that nobody ever takes\nthe corresponding write lock you\u0027ll feel better :)\n\nAs far as I can gather it\u0027s an attempt to guard against the removal of\nthe corresponding modules.  Since neither module can be unloaded at all\nwe can leave it to whoever fixes up IPv6 unloading :)\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4195f81453b9727f82bb8ceae03411b7fe52a994",
      "tree": "061d410408c883058afbbbbc39b4276ac359dc03",
      "parents": [
        "ae181bc44c65fdc93d0d2d908534b22e43f60f56"
      ],
      "author": {
        "name": "Alexey Dobriyan",
        "email": "adobriyan@gmail.com",
        "time": "Mon May 22 16:53:22 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon May 22 16:53:22 2006 -0700"
      },
      "message": "[NET]: Fix \"ntohl(ntohs\" bugs\n\nSigned-off-by: Alexey Dobriyan \u003cadobriyan@gmail.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e"
    },
    {
      "commit": "e959d8121fcbfee6ec049cc617e9423d1799f2e4",
      "tree": "5bbb925d554c1c0c29ce36cb9a771a12bf403861",
      "parents": [
        "f3111502c065d32dcb021f55e30398aaebd8fb0f"
      ],
      "author": {
        "name": "Ingo Molnar",
        "email": "mingo@elte.hu",
        "time": "Fri Apr 28 15:32:29 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Apr 29 18:33:21 2006 -0700"
      },
      "message": "[XFRM]: fix incorrect xfrm_policy_afinfo_lock use\n\nxfrm_policy_afinfo_lock can be taken in bh context, at:\n\n [\u003cc013fe1a\u003e] lockdep_acquire_read+0x54/0x6d\n [\u003cc0f6e024\u003e] _read_lock+0x15/0x22\n [\u003cc0e8fcdb\u003e] xfrm_policy_get_afinfo+0x1a/0x3d\n [\u003cc0e8fd10\u003e] xfrm_decode_session+0x12/0x32\n [\u003cc0e66094\u003e] ip_route_me_harder+0x1c9/0x25b\n [\u003cc0e770d3\u003e] ip_nat_local_fn+0x94/0xad\n [\u003cc0e2bbc8\u003e] nf_iterate+0x2e/0x7a\n [\u003cc0e2bc50\u003e] nf_hook_slow+0x3c/0x9e\n [\u003cc0e3a342\u003e] ip_push_pending_frames+0x2de/0x3a7\n [\u003cc0e53e19\u003e] icmp_push_reply+0x136/0x141\n [\u003cc0e543fb\u003e] icmp_reply+0x118/0x1a0\n [\u003cc0e54581\u003e] icmp_echo+0x44/0x46\n [\u003cc0e53fad\u003e] icmp_rcv+0x111/0x138\n [\u003cc0e36764\u003e] ip_local_deliver+0x150/0x1f9\n [\u003cc0e36be2\u003e] ip_rcv+0x3d5/0x413\n [\u003cc0df760f\u003e] netif_receive_skb+0x337/0x356\n [\u003cc0df76c3\u003e] process_backlog+0x95/0x110\n [\u003cc0df5fe2\u003e] net_rx_action+0xa5/0x16d\n [\u003cc012d8a7\u003e] __do_softirq+0x6f/0xe6\n [\u003cc0105ec2\u003e] do_softirq+0x52/0xb1\n\nthis means that all write-locking of xfrm_policy_afinfo_lock must be\nbh-safe. This patch fixes xfrm_policy_register_afinfo() and\nxfrm_policy_unregister_afinfo().\n\nSigned-off-by: Ingo Molnar \u003cmingo@elte.hu\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f3111502c065d32dcb021f55e30398aaebd8fb0f",
      "tree": "59c51b1d18f866c38d23ad6fe74820f0a2cdb43d",
      "parents": [
        "83de47cd0c5738105f40e65191b0761dfa7431ac"
      ],
      "author": {
        "name": "Ingo Molnar",
        "email": "mingo@elte.hu",
        "time": "Fri Apr 28 15:30:03 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Apr 29 18:33:20 2006 -0700"
      },
      "message": "[XFRM]: fix incorrect xfrm_state_afinfo_lock use\n\nxfrm_state_afinfo_lock can be read-locked from bh context, so take it\nin a bh-safe manner in xfrm_state_register_afinfo() and\nxfrm_state_unregister_afinfo(). Found by the lock validator.\n\nSigned-off-by: Ingo Molnar \u003cmingo@elte.hu\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "8dff7c29707b7514043539f5ab5e0a6eb7bd9dcd",
      "tree": "a584dcfb2142d4596086d7081a3d63fd9988e7ce",
      "parents": [
        "a76e07acd0de635122c5e60ccd5e55f9d5082391"
      ],
      "author": {
        "name": "Ingo Molnar",
        "email": "mingo@elte.hu",
        "time": "Fri Apr 28 15:23:59 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Apr 29 18:33:18 2006 -0700"
      },
      "message": "[XFRM]: fix softirq-unsafe xfrm typemap-\u003elock use\n\nxfrm typemap-\u003elock may be used in softirq context, so all write_lock()\nuses must be softirq-safe.\n\nSigned-off-by: Ingo Molnar \u003cmingo@elte.hu\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2717096ab41eacdbf07352dca6826b59470eb39a",
      "tree": "9282ac7ffd15bbd41f438201ef76f6deaa23c90a",
      "parents": [
        "6c97e72a162648eaf7c401cfc139493cefa6bed2"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Fri Apr 14 15:03:05 2006 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Apr 14 15:03:05 2006 -0700"
      },
      "message": "[XFRM]: Fix aevent timer.\n\nSend aevent immediately if we have sent nothing since last timer and\nthis is the first packet.\n\nFixes a corner case when packet threshold is very high, the timer low\nand a very low packet rate input which is bursty.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "dbe5b4aaafc715b12dbbea309d3d17958d01fd65",
      "tree": "936518ad9d5452f5efe18e0107255eab0aafb58d",
      "parents": [
        "e695633e21ffb6a443a8c2f8b3f095c7f1a48eb0"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat Apr 01 00:54:16 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Apr 01 00:54:16 2006 -0800"
      },
      "message": "[IPSEC]: Kill unused decap state structure\n\nThis patch removes the *_decap_state structures which were previously\nused to share state between input/post_input.  This is no longer\nneeded.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "be33690d8fcf40377f16193c463681170eb6b295",
      "tree": "08c7be2ba1d046fca40bbb1d3ddac789b393ecc9",
      "parents": [
        "15d99e02babae8bc20b836917ace07d93e318149"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Mar 20 22:40:54 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 22:40:54 2006 -0800"
      },
      "message": "[XFRM]: Fix aevent related crash\n\nWhen xfrm_user isn\u0027t loaded xfrm_nl is NULL, which makes IPsec crash because\nxfrm_aevent_is_on passes the NULL pointer to netlink_has_listeners as socket.\nA second problem is that the xfrm_nl pointer is not cleared when the socket\nis releases at module unload time.\n\nProtect references of xfrm_nl from outside of xfrm_user by RCU, check\nthat the socket is present in xfrm_aevent_is_on and set it to NULL\nwhen unloading xfrm_user.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4a3e2f711a00a1feb72ae12fdc749da10179d185",
      "tree": "76ced9d3270dea4b864da71fa1d4415d2e3c8b11",
      "parents": [
        "d4ccd08cdfa8d34f4d25b62041343c52fc79385f"
      ],
      "author": {
        "name": "Arjan van de Ven",
        "email": "arjan@infradead.org",
        "time": "Mon Mar 20 22:33:17 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 22:33:17 2006 -0800"
      },
      "message": "[NET] sem2mutex: net/\n\nSemaphore to mutex conversion.\n\nThe conversion was generated via scripts, and the result was validated\nautomatically via a script as well.\n\nSigned-off-by: Arjan van de Ven \u003carjan@infradead.org\u003e\nSigned-off-by: Ingo Molnar \u003cmingo@elte.hu\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "253aa11578c1b89757282430891bb66ae5300092",
      "tree": "00ff3d18c1a7ead1bca4602385e85b65f012823c",
      "parents": [
        "50bf3e224a2963c6dd5098f77bd7233222ebfbd2"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 22:23:35 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 22:23:35 2006 -0800"
      },
      "message": "[IPSEC] xfrm_user: Kill PAGE_SIZE check in verify_sec_ctx_len()\n\nFirst, it warns when PAGE_SIZE \u003e\u003d 64K because the ctx_len\nfield is 16-bits.\n\nSecondly, if there are any real length limitations it can\nbe verified by the security layer security_xfrm_state_alloc()\ncall.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a70fcb0ba337956d91476e2e7c3e71d9df940a82",
      "tree": "500eb6a2296f4aae0581936e8832504f153f984e",
      "parents": [
        "ee857a7d672859cf4eb735d32bce22c8b7ad0bd2"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 19:18:52 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 19:18:52 2006 -0800"
      },
      "message": "[XFRM]: Add some missing exports.\n\nTo fix the case of modular xfrm_user.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ee857a7d672859cf4eb735d32bce22c8b7ad0bd2",
      "tree": "4a6274454ed4af42fb2806151d14280f778f2281",
      "parents": [
        "0ac8475248164553ffe21948c7b1a4b9d2a935dc"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 19:18:37 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 19:18:37 2006 -0800"
      },
      "message": "[XFRM]: Move xfrm_nl to xfrm_state.c from xfrm_user.c\n\nxfrm_user could be modular, and since generic code uses this symbol\nnow...\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0ac8475248164553ffe21948c7b1a4b9d2a935dc",
      "tree": "45495847e8ea192c45c9babbd4b9e8c51d82692f",
      "parents": [
        "8c29bfe1cfbe6050c797a6364a0cc0ff57c377fc"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 19:18:23 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 19:18:23 2006 -0800"
      },
      "message": "[XFRM]: Make sure xfrm_replay_timer_handler() is declared early enough.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6c5c8ca7ff20523e427b955aa84cef407934710f",
      "tree": "382a4b07027efd8a41638ed9c051cc9ec2506f0b",
      "parents": [
        "53bc6b4d29c07664f3abe029b7e6878a1067899a"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Mon Mar 20 19:17:25 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 19:17:25 2006 -0800"
      },
      "message": "[IPSEC]: Sync series - policy expires\n\nThis is similar to the SA expire insertion patch - only it inserts\nexpires for SP.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "53bc6b4d29c07664f3abe029b7e6878a1067899a",
      "tree": "d97fc26acc763dde9d1dc15573a51253180b617f",
      "parents": [
        "980ebd25794f0f87ac32844e2c73e9e81f0a72ba"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Mon Mar 20 19:17:03 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 19:17:03 2006 -0800"
      },
      "message": "[IPSEC]: Sync series - SA expires\n\nThis patch allows a user to insert SA expires. This is useful to\ndo on an HA backup for the case of byte counts but may not be very\nuseful for the case of time based expiry.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "980ebd25794f0f87ac32844e2c73e9e81f0a72ba",
      "tree": "da52df6e31bd4b2527c223ca2585e0d792bf3ea2",
      "parents": [
        "d51d081d65048a7a6f9956a7809c3bb504f3b95d"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Mon Mar 20 19:16:40 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 19:16:40 2006 -0800"
      },
      "message": "[IPSEC]: Sync series - acquire insert\n\nThis introduces a feature similar to the one described in RFC 2367:\n\"\n   ... the application needing an SA sends a PF_KEY\n   SADB_ACQUIRE message down to the Key Engine, which then either\n   returns an error or sends a similar SADB_ACQUIRE message up to one or\n   more key management applications capable of creating such SAs.\n   ...\n   ...\n   The third is where an application-layer consumer of security\n   associations (e.g.  an OSPFv2 or RIPv2 daemon) needs a security\n   association.\n\n        Send an SADB_ACQUIRE message from a user process to the kernel.\n\n        \u003cbase, address(SD), (address(P),) (identity(SD),) (sensitivity,)\n          proposal\u003e\n\n        The kernel returns an SADB_ACQUIRE message to registered\n          sockets.\n\n        \u003cbase, address(SD), (address(P),) (identity(SD),) (sensitivity,)\n          proposal\u003e\n\n        The user-level consumer waits for an SADB_UPDATE or SADB_ADD\n        message for its particular type, and then can use that\n        association by using SADB_GET messages.\n\n \"\nAn app such as OSPF could then use ipsec KM to get keys\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d51d081d65048a7a6f9956a7809c3bb504f3b95d",
      "tree": "55c62e9f6ff96d131a3ba59090d76209b68051ae",
      "parents": [
        "9500e8a81fe6302fcc5e4110adc4d166c9873d3a"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Mon Mar 20 19:16:12 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 19:16:12 2006 -0800"
      },
      "message": "[IPSEC]: Sync series - user\n\nAdd xfrm as the user of the core changes\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f8cd54884e675dfaf0c86cc7c088adb6ca9d7638",
      "tree": "7850e8ebebf1f8543c96acdd7c197003b3b4d54c",
      "parents": [
        "f5539eb8caa52a9198079df767cc1bb5494e69e3"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Mon Mar 20 19:15:11 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Mar 20 19:15:11 2006 -0800"
      },
      "message": "[IPSEC]: Sync series - core changes\n\nThis patch provides the core functionality needed for sync events\nfor ipsec. Derived work of Krisztian KOVACS \u003chidden@balabit.hu\u003e\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "752c1f4c78fe86d0fd6497387f763306b0d8fc53",
      "tree": "50d7e52940d1adf0936805645d52e2419e5922cf",
      "parents": [
        "4bf05eceecf2efb4c883e9e9b17825682e7330dd"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Feb 27 13:00:40 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 27 13:00:40 2006 -0800"
      },
      "message": "[IPSEC]: Kill post_input hook and do NAT-T in esp_input directly\n\nThe only reason post_input exists at all is that it gives us the\npotential to adjust the checksums incrementally in future which\nwe ought to do.\n\nHowever, after thinking about it for a bit we can adjust the\nchecksums without using this post_input stuff at all.  The crucial\npoint is that only the inner-most NAT-T SA needs to be considered\nwhen adjusting checksums.  What\u0027s more, the checksum adjustment\ncomes down to a single u32 due to the linearity of IP checksums.\n\nWe just happen to have a spare u32 lying around in our skb structure :)\nWhen ip_summed is set to CHECKSUM_NONE on input, the value of skb-\u003ecsum\nis currently unused.  All we have to do is to make that the checksum\nadjustment and voila, there goes all the post_input and decap structures!\n\nI\u0027ve left in the decap data structures for now since it\u0027s intricately\nwoven into the sec_path stuff.  We can kill them later too.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "21380b81ef8699179b535e197a95b891a7badac7",
      "tree": "1a6be9864cabbed59db6357b2f0244413acac4c4",
      "parents": [
        "85259878499d6c428cba191bb4e415a250dcd75a"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Feb 22 14:47:13 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Feb 23 16:10:53 2006 -0800"
      },
      "message": "[XFRM]: Eliminate refcounting confusion by creating __xfrm_state_put().\n\nWe often just do an atomic_dec(\u0026x-\u003erefcnt) on an xfrm_state object\nbecause we know there is more than 1 reference remaining and thus\nwe can elide the heavier xfrm_state_put() call.\n\nDo this behind an inline function called __xfrm_state_put() so that is\nmore obvious and also to allow us to more cleanly add refcount\ndebugging later.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "42cf93cd464e0df3c85d298c647411bae6d99e6e",
      "tree": "f68f155f6eedbac8ac8c32c8c947d5a2f6cb2033",
      "parents": [
        "a80614d1adba903a1e5cb22bf14ebc640fc2ba4c"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Tue Feb 21 13:37:35 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Feb 23 16:10:51 2006 -0800"
      },
      "message": "[NETFILTER]: Fix bridge netfilter related in xfrm_lookup\n\nThe bridge-netfilter code attaches a fake dst_entry with dst-\u003eops \u003d\u003d NULL\nto purely bridged packets. When these packets are SNATed and a policy\nlookup is done, xfrm_lookup crashes because it tries to dereference\ndst-\u003eops.\n\nChange xfrm_lookup not to dereference dst-\u003eops before checking for the\nDST_NOXFRM flag and set this flag in the fake dst_entry.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "995110143880fd9cb255fa5df05f8950c56fb43a",
      "tree": "06666d72e4a4e06c646cb0ca683ee9ce0f286c82",
      "parents": [
        "bd71c2b17468a2531fb4c81ec1d73520845e97e1"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Feb 19 22:11:50 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sun Feb 19 22:11:50 2006 -0800"
      },
      "message": "[XFRM]: Fix policy double put\n\nThe policy is put once immediately and once at the error label, which results\nin the following Oops:\n\nkernel BUG at net/xfrm/xfrm_policy.c:250!\ninvalid opcode: 0000 [#2]\nPREEMPT\n[...]\nCPU:    0\nEIP:    0060:[\u003cc028caf7\u003e]    Not tainted VLI\nEFLAGS: 00210246   (2.6.16-rc3 #39)\nEIP is at __xfrm_policy_destroy+0xf/0x46\neax: d49f2000   ebx: d49f2000   ecx: f74bd880   edx: f74bd280\nesi: d49f2000   edi: 00000001   ebp: cd506dcc   esp: cd506dc8\nds: 007b   es: 007b   ss: 0068\nProcess ssh (pid: 31970, threadinfo\u003dcd506000 task\u003dcfb04a70)\nStack: \u003c0\u003ecd506000 cd506e34 c028e92b ebde7280 cd506e58 cd506ec0 f74bd280 00000000\n       00000214 0000000a 0000000a 00000000 00000002 f7ae6000 00000000 cd506e58\n       cd506e14 c0299e36 f74bd280 e873fe00 c02943fd cd506ec0 ebde7280 f271f440\nCall Trace:\n [\u003cc0103a44\u003e] show_stack_log_lvl+0xaa/0xb5\n [\u003cc0103b75\u003e] show_registers+0x126/0x18c\n [\u003cc0103e68\u003e] die+0x14e/0x1db\n [\u003cc02b6809\u003e] do_trap+0x7c/0x96\n [\u003cc0104237\u003e] do_invalid_op+0x89/0x93\n [\u003cc01035af\u003e] error_code+0x4f/0x54\n [\u003cc028e92b\u003e] xfrm_lookup+0x349/0x3c2\n [\u003cc02b0b0d\u003e] ip6_datagram_connect+0x317/0x452\n [\u003cc0281749\u003e] inet_dgram_connect+0x49/0x54\n [\u003cc02404d2\u003e] sys_connect+0x51/0x68\n [\u003cc0240928\u003e] sys_socketcall+0x6f/0x166\n [\u003cc0102aa1\u003e] syscall_call+0x7/0xb\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "00de651d14baabc5c1d2f32c49d9a984d8891c8e",
      "tree": "dee86291586baf00e9c34dd8f4545088a36877ef",
      "parents": [
        "6d3e85ecf22a5e3610df47b9c3fb2fc32cfd35bf"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Feb 13 16:01:27 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Feb 13 16:01:27 2006 -0800"
      },
      "message": "[IPSEC]: Fix strange IPsec freeze.\n\nProblem discovered and initial patch by Olaf Kirch:\n\n\tthere\u0027s a problem with IPsec that has been bugging some of our users\n\tfor the last couple of kernel revs. Every now and then, IPsec will\n\tfreeze the machine completely. This is with openswan user land,\n\tand with kernels up to and including 2.6.16-rc2.\n\n\tI managed to debug this a little, and what happens is that we end\n\tup looping in xfrm_lookup, and never get out. With a bit of debug\n\tprintks added, I can this happening:\n\n\t\tip_route_output_flow calls xfrm_lookup\n\n\t\txfrm_find_bundle returns NULL (apparently we\u0027re in the\n\t\t\tmiddle of negotiating a new SA or something)\n\n\t\tWe therefore call xfrm_tmpl_resolve. This returns EAGAIN\n\t\t\tWe go to sleep, waiting for a policy update.\n\t\t\tThen we loop back to the top\n\n\t\tApparently, the dst_orig that was passed into xfrm_lookup\n\t\t\thas been dropped from the routing table (obsolete\u003d2)\n\t\t\tThis leads to the endless loop, because we now create\n\t\t\ta new bundle, check the new bundle and find it\u0027s stale\n\t\t\t(stale_bundle -\u003e xfrm_bundle_ok -\u003e dst_check() return 0)\n\n\tPeople have been testing with the patch below, which seems to fix the\n\tproblem partially. They still see connection hangs however (things\n\tonly clear up when they start a new ping or new ssh). So the patch\n\tis obvsiouly not sufficient, and something else seems to go wrong.\n\n\tI\u0027m grateful for any hints you may have...\n\nI suggest that we simply bail out always.  If the dst decides to die\non us later on, the packet will be dropped anyway.  So there is no\ngreat urgency to retry here.  Once we have the proper resolution\nqueueing, we can then do the retry again.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nAcked-by: Olaf Kirch \u003cokir@suse.de\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1b8623545b42c03eb92e51b28c84acf4b8ba00a3",
      "tree": "071045ad9c60d2697292c523c77322a70a248fb9",
      "parents": [
        "92118c739df879497b8cc5a2eb3a9dc255f01b20"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Thu Dec 15 01:07:03 2005 -0500"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Tue Feb 07 20:56:35 2006 -0500"
      },
      "message": "[PATCH] remove bogus asm/bug.h includes.\n\nA bunch of asm/bug.h includes are both not needed (since it will get\npulled anyway) and bogus (since they are done too early).  Removed.\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "09a626600b437d91f6b13ade5c7c4b374893c54e",
      "tree": "a6de3c2a33b7d896cd22a3fe799d1b40d28daf40",
      "parents": [
        "4bba3925924148c24fb0c7636a04ad69a6a56b84"
      ],
      "author": {
        "name": "Kris Katterjohn",
        "email": "kjak@users.sourceforge.net",
        "time": "Sun Jan 08 22:24:28 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Jan 09 14:16:18 2006 -0800"
      },
      "message": "[NET]: Change some \"if (x) BUG();\" to \"BUG_ON(x);\"\n\nThis changes some simple \"if (x) BUG();\" statements to \"BUG_ON(x);\"\n\nSigned-off-by: Kris Katterjohn \u003ckjak@users.sourceforge.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "eb9c7ebe6980c41cf6ae889e301c3b49f473ee9f",
      "tree": "419103d15b9de9c26c8400c698625231df55da91",
      "parents": [
        "b59c270104f03960069596722fea70340579244d"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Fri Jan 06 23:06:30 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Jan 07 12:57:37 2006 -0800"
      },
      "message": "[NETFILTER]: Handle NAT in IPsec policy checks\n\nHandle NAT of decapsulated IPsec packets by reconstructing the struct flowi\nof the original packet from the conntrack information for IPsec policy\nchecks.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "3e3850e989c5d2eb1aab6f0fd9257759f0f4cbc6",
      "tree": "fa05d1de4767bc30e77442ffbacfe8bd8dd2213d",
      "parents": [
        "8cdfab8a43bb4b3da686ea503a702cb6f9f6a803"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Fri Jan 06 23:04:54 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Sat Jan 07 12:57:33 2006 -0800"
      },
      "message": "[NETFILTER]: Fix xfrm lookup in ip_route_me_harder/ip6_route_me_harder\n\nip_route_me_harder doesn\u0027t use the port numbers of the xfrm lookup and\nuses ip_route_input for non-local addresses which doesn\u0027t do a xfrm\nlookup, ip6_route_me_harder doesn\u0027t do a xfrm lookup at all.\n\nUse xfrm_decode_session and do the lookup manually, make sure both\nonly do the lookup if the packet hasn\u0027t been transformed already.\n\nMakeing sure the lookup only happens once needs a new field in the\nIP6CB, which exceeds the size of skb-\u003ecb. The size of skb-\u003ecb is\nincreased to 48b. Apparently the IPv6 mobile extensions need some\nmore room anyway.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5f8ac64b15172c7ced7d7990eb28342092bc751b",
      "tree": "63046817c9a6e8db513379337f01289c045a5d63",
      "parents": [
        "69549ddd2f894c4cead50ee2b60cc02990c389ad"
      ],
      "author": {
        "name": "Trent Jaeger",
        "email": "tjaeger@cse.psu.edu",
        "time": "Fri Jan 06 13:22:39 2006 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Fri Jan 06 13:22:39 2006 -0800"
      },
      "message": "[LSM-IPSec]: Corrections to LSM-IPSec Nethooks\n\nThis patch contains two corrections to the LSM-IPsec Nethooks patches\npreviously applied.  \n\n(1) free a security context on a failed insert via xfrm_user \ninterface in xfrm_add_policy.  Memory leak.\n\n(2) change the authorization of the allocation of a security context\nin a xfrm_policy or xfrm_state from both relabelfrom and relabelto \nto setcontext.\n\nSigned-off-by: Trent Jaeger \u003ctjaeger@cse.psu.edu\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "df71837d5024e2524cd51c93621e558aa7dd9f3f",
      "tree": "58938f1d46f3c6713b63e5a785e82fdbb10121a1",
      "parents": [
        "88026842b0a760145aa71d69e74fbc9ec118ca44"
      ],
      "author": {
        "name": "Trent Jaeger",
        "email": "tjaeger@cse.psu.edu",
        "time": "Tue Dec 13 23:12:27 2005 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue Jan 03 13:10:24 2006 -0800"
      },
      "message": "[LSM-IPSec]: Security association restriction.\n\nThis patch series implements per packet access control via the\nextension of the Linux Security Modules (LSM) interface by hooks in\nthe XFRM and pfkey subsystems that leverage IPSec security\nassociations to label packets.  Extensions to the SELinux LSM are\nincluded that leverage the patch for this purpose.\n\nThis patch implements the changes necessary to the XFRM subsystem,\npfkey interface, ipv4/ipv6, and xfrm_user interface to restrict a\nsocket to use only authorized security associations (or no security\nassociation) to send/receive network packets.\n\nPatch purpose:\n\nThe patch is designed to enable access control per packets based on\nthe strongly authenticated IPSec security association.  Such access\ncontrols augment the existing ones based on network interface and IP\naddress.  The former are very coarse-grained, and the latter can be\nspoofed.  By using IPSec, the system can control access to remote\nhosts based on cryptographic keys generated using the IPSec mechanism.\nThis enables access control on a per-machine basis or per-application\nif the remote machine is running the same mechanism and trusted to\nenforce the access control policy.\n\nPatch design approach:\n\nThe overall approach is that policy (xfrm_policy) entries set by\nuser-level programs (e.g., setkey for ipsec-tools) are extended with a\nsecurity context that is used at policy selection time in the XFRM\nsubsystem to restrict the sockets that can send/receive packets via\nsecurity associations (xfrm_states) that are built from those\npolicies.\n\nA presentation available at\nwww.selinux-symposium.org/2005/presentations/session2/2-3-jaeger.pdf\nfrom the SELinux symposium describes the overall approach.\n\nPatch implementation details:\n\nOn output, the policy retrieved (via xfrm_policy_lookup or\nxfrm_sk_policy_lookup) must be authorized for the security context of\nthe socket and the same security context is required for resultant\nsecurity association (retrieved or negotiated via racoon in\nipsec-tools).  This is enforced in xfrm_state_find.\n\nOn input, the policy retrieved must also be authorized for the socket\n(at __xfrm_policy_check), and the security context of the policy must\nalso match the security association being used.\n\nThe patch has virtually no impact on packets that do not use IPSec.\nThe existing Netfilter (outgoing) and LSM rcv_skb hooks are used as\nbefore.\n\nAlso, if IPSec is used without security contexts, the impact is\nminimal.  The LSM must allow such policies to be selected for the\ncombination of socket and remote machine, but subsequent IPSec\nprocessing proceeds as in the original case.\n\nTesting:\n\nThe pfkey interface is tested using the ipsec-tools.  ipsec-tools have\nbeen modified (a separate ipsec-tools patch is available for version\n0.5) that supports assignment of xfrm_policy entries and security\nassociations with security contexts via setkey and the negotiation\nusing the security contexts via racoon.\n\nThe xfrm_user interface is tested via ad hoc programs that set\nsecurity contexts.  These programs are also available from me, and\ncontain programs for setting, getting, and deleting policy for testing\nthis interface.  Testing of sa functions was done by tracing kernel\nbehavior.\n\nSigned-off-by: Trent Jaeger \u003ctjaeger@cse.psu.edu\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "9b78a82c1cf19aa813bdaa184fa840a3ba811750",
      "tree": "5500cc243037614ed8787b39a3f1baa0246443c9",
      "parents": [
        "4c7e6895027362889422e5dc437dc3238b6b4745"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Dec 22 07:39:48 2005 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Dec 22 07:39:48 2005 -0800"
      },
      "message": "[IPSEC]: Fix policy updates missed by sockets\n\nThe problem is that when new policies are inserted, sockets do not see\nthe update (but all new route lookups do).\n\nThis bug is related to the SA insertion stale route issue solved\nrecently, and this policy visibility problem can be fixed in a similar\nway.\n\nThe fix is to flush out the bundles of all policies deeper than the\npolicy being inserted.  Consider beginning state of \"outgoing\"\ndirection policy list:\n\n\tpolicy A --\u003e policy B --\u003e policy C --\u003e policy D\n\nFirst, realize that inserting a policy into a list only potentially\nchanges IPSEC routes for that direction.  Therefore we need not bother\nconsidering the policies for other directions.  We need only consider\nthe existing policies in the list we are doing the inserting.\n\nConsider new policy \"B\u0027\", inserted after B.\n\n\tpolicy A --\u003e policy B --\u003e policy B\u0027 --\u003e policy C --\u003e policy D\n\nTwo rules:\n\n1) If policy A or policy B matched before the insertion, they\n   appear before B\u0027 and thus would still match after inserting\n   B\u0027\n\n2) Policy C and D, now \"shadowed\" and after policy B\u0027, potentially\n   contain stale routes because policy B\u0027 might be selected\n   instead of them.\n\nTherefore we only need flush routes assosciated with policies\nappearing after a newly inserted policy, if any.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "399c180ac5f0cb66ef9479358e0b8b6bafcbeafe",
      "tree": "4014154b7800e96058d94f78dc34a53681e8d5e5",
      "parents": [
        "9e999993c71e1506378d26d81f842277aff8a250"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Dec 19 14:23:23 2005 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Dec 19 14:23:23 2005 -0800"
      },
      "message": "[IPSEC]: Perform SA switchover immediately.\n\nWhen we insert a new xfrm_state which potentially\nsubsumes an existing one, make sure all cached\nbundles are flushed so that the new SA is used\nimmediately.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "88fc2c84312d095545c08a9f871ad1888a688cf6",
      "tree": "73ff00acabf9cee4b3a8c5b00f4cd44262fdc7df",
      "parents": [
        "82ace47a7256fd39d370a6442e0649f75961b831"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Thu Nov 10 02:25:54 2005 +0100"
      },
      "committer": {
        "name": "Thomas Graf",
        "email": "tgr@axs.localdomain",
        "time": "Thu Nov 10 02:26:40 2005 +0100"
      },
      "message": "[XFRM]: Use generic netlink receive queue processor\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a8f74b228826eef1cbe04a05647d61e896f5fd63",
      "tree": "6abffeafca83f1aa342ed905367fab1f5a1ac554",
      "parents": [
        "bfa83a9e03cf8d501c6272999843470afecb32ed"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Thu Nov 10 02:25:52 2005 +0100"
      },
      "committer": {
        "name": "Thomas Graf",
        "email": "tgr@axs.localdomain",
        "time": "Thu Nov 10 02:26:40 2005 +0100"
      },
      "message": "[NETLINK]: Make netlink_callback-\u003edone() optional\n\nMost netlink families make no use of the done() callback, making\nit optional gets rid of all unnecessary dummy implementations.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a51482bde22f99c63fbbb57d5d46cc666384e379",
      "tree": "5482ed1c0803edb2ffbd51035de921fb0f72d82b",
      "parents": [
        "ac7c98eca88a854755475fcfe1b2bf5f97f90d99"
      ],
      "author": {
        "name": "Jesper Juhl",
        "email": "jesper.juhl@gmail.com",
        "time": "Tue Nov 08 09:41:34 2005 -0800"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Nov 08 09:41:34 2005 -0800"
      },
      "message": "[NET]: kfree cleanup\n\nFrom: Jesper Juhl \u003cjesper.juhl@gmail.com\u003e\n\nThis is the net/ part of the big kfree cleanup patch.\n\nRemove pointless checks for NULL prior to calling kfree() in net/.\n\nSigned-off-by: Jesper Juhl \u003cjesper.juhl@gmail.com\u003e\nCc: \"David S. Miller\" \u003cdavem@davemloft.net\u003e\nCc: Arnaldo Carvalho de Melo \u003cacme@conectiva.com.br\u003e\nAcked-by: Marcel Holtmann \u003cmarcel@holtmann.org\u003e\nAcked-by: YOSHIFUJI Hideaki \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\n"
    },
    {
      "commit": "80b30c1023dbd795faf948dee0cfb3b270b56d47",
      "tree": "18a6c4d4647e6b52ea9b53e1f938b5e7f7e97f8f",
      "parents": [
        "1371e37da299d4df6267ad0ddf010435782c28e9"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat Oct 15 10:58:30 2005 +1000"
      },
      "committer": {
        "name": "Arnaldo Carvalho de Melo",
        "email": "acme@mandriva.com",
        "time": "Wed Oct 26 00:48:45 2005 -0200"
      },
      "message": "[IPSEC]: Kill obsolete get_mss function\n\nNow that we\u0027ve switched over to storing MTUs in the xfrm_dst entries,\nwe no longer need the dst\u0027s get_mss methods.  This patch gets rid of\nthem.\n\nIt also documents the fact that our MTU calculation is not optimal\nfor ESP.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: Arnaldo Carvalho de Melo \u003cacme@mandriva.com\u003e\n"
    },
    {
      "commit": "dd0fc66fb33cd610bc1a5db8a5e232d34879b4d7",
      "tree": "51f96a9db96293b352e358f66032e1f4ff79fafb",
      "parents": [
        "3b0e77bd144203a507eb191f7117d2c5004ea1de"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@ftp.linux.org.uk",
        "time": "Fri Oct 07 07:46:04 2005 +0100"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Sat Oct 08 15:00:57 2005 -0700"
      },
      "message": "[PATCH] gfp flags annotations - part 1\n\n - added typedef unsigned int __nocast gfp_t;\n\n - replaced __nocast uses for gfp flags with gfp_t - it gives exactly\n   the same warnings as far as sparse is concerned, doesn\u0027t change\n   generated code (from gcc point of view we replaced unsigned int with\n   typedef) and documents what\u0027s going on far better.\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@osdl.org\u003e\n"
    },
    {
      "commit": "77d8d7a6848c81084f413e1ec4982123a56e2ccb",
      "tree": "37a160b0b5fcb8a079bcafec5091fd331e14d54c",
      "parents": [
        "140e26fcd559f6988e5a9056385eecade19d9b49"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Wed Oct 05 12:15:12 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed Oct 05 12:15:12 2005 -0700"
      },
      "message": "[IPSEC]: Document that policy direction is derived from the index.\n\nHere is a patch that adds a helper called xfrm_policy_id2dir to\ndocument the fact that the policy direction can be and is derived\nfrom the index.\n\nThis is based on a patch by YOSHIFUJI Hideaki and 210313105@suda.edu.cn.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "83fa3400ebcba307a60909824a251be984eb9567",
      "tree": "b01c3eaabd156ba75ec41bea0be3d73fd066713c",
      "parents": [
        "3d2aef668920e8d93b77f145f8f647f62abe75db"
      ],
      "author": {
        "name": "Randy Dunlap",
        "email": "rdunlap@xenotime.net",
        "time": "Tue Oct 04 22:45:35 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Oct 04 22:45:35 2005 -0700"
      },
      "message": "[XFRM]: fix sparse gfp nocast warnings\n\nFix implicit nocast warnings in xfrm code:\nnet/xfrm/xfrm_policy.c:232:47: warning: implicit cast to nocast type\n\nSigned-off-by: Randy Dunlap \u003crdunlap@xenotime.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "e104411b82f5c4d19752c335492036abdbf5880d",
      "tree": "03f26f98685689ab6bfa47d5bdbb6730f64bfadb",
      "parents": [
        "cf0b450cd5176b68ac7d5bbe68aeae6bb6a5a4b8"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Thu Sep 08 15:11:55 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu Sep 08 15:11:55 2005 -0700"
      },
      "message": "[XFRM]: Always release dst_entry on error in xfrm_lookup\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ba89966c1984513f4f2cc0a6c182266be44ddd03",
      "tree": "6e5766fc5c287708c03e0a162531dfd4785b0703",
      "parents": [
        "29cb9f9c5502f6218cd3ea574efe46a5e55522d2"
      ],
      "author": {
        "name": "Eric Dumazet",
        "email": "dada1@cosmosbay.com",
        "time": "Fri Aug 26 12:05:31 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Aug 29 16:11:18 2005 -0700"
      },
      "message": "[NET]: use __read_mostly on kmem_cache_t , DEFINE_SNMP_STAT pointers\n\nThis patch puts mostly read only data in the right section\n(read_mostly), to help sharing of these data between CPUS without\nmemory ping pongs.\n\nOn one of my production machine, tcp_statistics was sitting in a\nheavily modified cache line, so *every* SNMP update had to force a\nreload.\n\nSigned-off-by: Eric Dumazet \u003cdada1@cosmosbay.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "066286071d3542243baa68166acb779187c848b3",
      "tree": "ef6604f16ceb13842a30311654e6a64aac716c48",
      "parents": [
        "9a4595bc7e67962f13232ee55a64e063062c3a99"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Mon Aug 15 12:33:26 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Aug 29 16:01:11 2005 -0700"
      },
      "message": "[NETLINK]: Add \"groups\" argument to netlink_kernel_create\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ac6d439d2097b72ea0cbc2322ce1263a38bc1fd0",
      "tree": "19e638a226993dddede5a2da577e2572f7555a95",
      "parents": [
        "d629b836d151d43332492651dd841d32e57ebe3b"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Aug 14 19:29:52 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Aug 29 16:00:54 2005 -0700"
      },
      "message": "[NETLINK]: Convert netlink users to use group numbers instead of bitmasks\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "43e943c32b9213b5d25407b281c94aaa474fd9a6",
      "tree": "7844a1aa95d697ae378bc799085e1b29eb0b8a48",
      "parents": [
        "ad93e266a17c6f606e96304c866eb73665ae34fa"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sun Aug 14 19:25:47 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Aug 29 16:00:34 2005 -0700"
      },
      "message": "[NETLINK]: Fix missing dst_groups initializations in netlink_broadcast users\n\nnetlink_broadcast users must initialize NETLINK_CB(skb).dst_groups to the\ndestination group mask for netlink_recvmsg.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "4fdb3bb723db469717c6d38fda667d8b0fa86ebd",
      "tree": "43d82e717922e6319cf8a8f9dc5ee902c651b491",
      "parents": [
        "020b4c12dbe3868d792a01d7c1470cd837abe10f"
      ],
      "author": {
        "name": "Harald Welte",
        "email": "laforge@netfilter.org",
        "time": "Tue Aug 09 19:40:55 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Mon Aug 29 15:35:08 2005 -0700"
      },
      "message": "[NETLINK]: Add properly module refcounting for kernel netlink sockets.\n\n- Remove bogus code for compiling netlink as module\n- Add module refcounting support for modules implementing a netlink\n  protocol\n- Add support for autoloading modules that implement a netlink protocol\n  as soon as someone opens a socket for that protocol\n\nSigned-off-by: Harald Welte \u003claforge@netfilter.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "a4f1bac62564049ea4718c4624b0fadc9f597c84",
      "tree": "294ef690f2b8978ee83b9e4e7dadbfb391ea1f94",
      "parents": [
        "cadf01c2fc0cd66dfef4956ef1a6482ed01c3150"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Jul 26 15:43:17 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue Jul 26 15:43:17 2005 -0700"
      },
      "message": "[XFRM]: Fix possible overflow of sock-\u003esk_policy\n\nSpotted by, and original patch by, Balazs Scheidler.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "6a2e9b738cb5c929df73b6acabdd8f9a4e9a0416",
      "tree": "c7cdf9033093b52e360ad04dc29739ca36a617a4",
      "parents": [
        "d5950b4355049092739bea97d1bdc14433126cc5"
      ],
      "author": {
        "name": "Sam Ravnborg",
        "email": "sam@ravnborg.org",
        "time": "Mon Jul 11 21:13:56 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jul 11 21:13:56 2005 -0700"
      },
      "message": "[NET]: move config options out to individual protocols\n\nMove the protocol specific config options out to the specific protocols.\nWith this change net/Kconfig now starts to become readable and serve as a\ngood basis for further re-structuring.\n\nThe menu structure is left almost intact, except that indention is\nfixed in most cases. Most visible are the INET changes where several\n\"depends on INET\" are replaced with a single ifdef INET / endif pair.\n\nSeveral new files were created to accomplish this change - they are\nsmall but serve the purpose that config options are now distributed\nout where they belongs.\n\nSigned-off-by: Sam Ravnborg \u003csam@ravnborg.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d094cd83c06e06e01d8edb540555f3f64e4081c2",
      "tree": "c9aad8ebaebbf0cde7c535bb764a6d6e859125fb",
      "parents": [
        "72cb6962a91f2af9eef69a06198e1949c10259ae"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Jun 20 13:19:41 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jun 20 13:19:41 2005 -0700"
      },
      "message": "[IPSEC]: Add xfrm_state_afinfo-\u003einit_flags\n\nThis patch adds the xfrm_state_afinfo-\u003einit_flags hook which allows\neach address family to perform any common initialisation that does\nnot require a corresponding destructor call.\n\nIt will be used subsequently to set the XFRM_STATE_NOPMTUDISC flag\nin IPv4.\n\nIt also fixes up the error codes returned by xfrm_init_state.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nAcked-by: James Morris \u003cjmorris@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "72cb6962a91f2af9eef69a06198e1949c10259ae",
      "tree": "3ae65d1c4e7d7cb7ac05bfc6f457312df45f6996",
      "parents": [
        "3f7a87d2fa9b42f7aade43914f060df68cc89cc7"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Mon Jun 20 13:18:08 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Mon Jun 20 13:18:08 2005 -0700"
      },
      "message": "[IPSEC]: Add xfrm_init_state\n\nThis patch adds xfrm_init_state which is simply a wrapper that calls\nxfrm_get_type and subsequently x-\u003etype-\u003einit_state.  It also gets rid\nof the unused args argument.\n\nAbstracting it out allows us to add common initialisation code, e.g.,\nto set family-specific flags.\n\nThe add_time setting in xfrm_user.c was deleted because it\u0027s already\nset by xfrm_state_alloc.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nAcked-by: James Morris \u003cjmorris@redhat.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0603eac0d6b77acac5924a2734228cbaf072f993",
      "tree": "e51536aab48997cc74f83bc618b95a9d88df12f2",
      "parents": [
        "b6544c0b4cf2bd96195f3cdb7cebfb35090fc557"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat Jun 18 22:54:36 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:54:36 2005 -0700"
      },
      "message": "[IPSEC]: Add XFRMA_SA/XFRMA_POLICY for delete notification\n\nThis patch changes the format of the XFRM_MSG_DELSA and\nXFRM_MSG_DELPOLICY notification so that the main message\nsent is of the same format as that received by the kernel\nif the original message was via netlink.  This also means\nthat we won\u0027t lose the byid information carried in km_event.\n\nSince this user interface is introduced by Jamal\u0027s patch\nwe can still afford to change it.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "ee57eef99b9e19194677f552ebc0690ec35d62db",
      "tree": "f7a6568dc56d60bba6d68d427bd019f491dc81d1",
      "parents": [
        "7d6dfe1f5bc4c56e0c31173014a099ec3fa35907"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Sat Jun 18 22:45:56 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:45:56 2005 -0700"
      },
      "message": "[IPSEC] Use NLMSG_LENGTH in xfrm_exp_state_notify\n\nSmall fixup to use netlink macros instead of hardcoding.\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "7d6dfe1f5bc4c56e0c31173014a099ec3fa35907",
      "tree": "a6b04337c4f6d1ff7b050082dc7e69dc5617d3d0",
      "parents": [
        "f60f6b8f70c756fc786d68f02ec17a1e84db645f"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Sat Jun 18 22:45:31 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:45:31 2005 -0700"
      },
      "message": "[IPSEC] Fix xfrm_state leaks in error path\n\nHerbert Xu wrote:\n\u003e @@ -1254,6 +1326,7 @@ static int pfkey_add(struct sock *sk, st\n\u003e       if (IS_ERR(x))\n\u003e               return PTR_ERR(x);\n\u003e\n\u003e +     xfrm_state_hold(x);\n\nThis introduces a leak when xfrm_state_add()/xfrm_state_update()\nfail. We hold two references (one from xfrm_state_alloc(), one\nfrom xfrm_state_hold()), but only drop one. We need to take the\nreference because the reference from xfrm_state_alloc() can\nbe dropped by __xfrm_state_delete(), so the fix is to drop both\nreferences on error. Same problem in xfrm_user.c.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "f60f6b8f70c756fc786d68f02ec17a1e84db645f",
      "tree": "8eee05de129439e4ffde876d2208a613178acfe3",
      "parents": [
        "e7443892f656d760ec1b9d92567178c87e100f4a"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat Jun 18 22:44:37 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:44:37 2005 -0700"
      },
      "message": "[IPSEC] Use XFRM_MSG_* instead of XFRM_SAP_*\n\nThis patch removes XFRM_SAP_* and converts them over to XFRM_MSG_*.\nThe netlink interface is meant to map directly onto the underlying\nxfrm subsystem.  Therefore rather than using a new independent\nrepresentation for the events we can simply use the existing ones\nfrom xfrm_user.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "e7443892f656d760ec1b9d92567178c87e100f4a",
      "tree": "1fafb0ca8fd4b81af36a2460b4acad3f68bef8ab",
      "parents": [
        "bf08867f91a43aa3ba2e4598c06c4769a6cdddf6"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat Jun 18 22:44:18 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:44:18 2005 -0700"
      },
      "message": "[IPSEC] Set byid for km_event in xfrm_get_policy\n\nThis patch fixes policy deletion in xfrm_user so that it sets\nkm_event.data.byid.  This puts xfrm_user on par with what af_key\ndoes in this case.\n   \nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "bf08867f91a43aa3ba2e4598c06c4769a6cdddf6",
      "tree": "316504b4756a32d802ea037815f2d9022ab88bfe",
      "parents": [
        "4f09f0bbc1cb3c74e8f2047ad4be201a059829ee"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat Jun 18 22:44:00 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:44:00 2005 -0700"
      },
      "message": "[IPSEC] Turn km_event.data into a union\n\nThis patch turns km_event.data into a union.  This makes code that\nuses it clearer.\n  \nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "4666faab095230ec8aa62da6c33391287f281154",
      "tree": "36d61925bb02dd7de537ff65d35190eeebbf47fa",
      "parents": [
        "26b15dad9f1c19d6d4f7b999b07eaa6d98e4b375"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Sat Jun 18 22:43:22 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:43:22 2005 -0700"
      },
      "message": "[IPSEC] Kill spurious hard expire messages\n\nThis patch ensures that the hard state/policy expire notifications are\nonly sent when the state/policy is successfully removed from their\nrespective tables.\n\nAs it is, it\u0027s possible for a state/policy to both expire through\nreaching a hard limit, as well as being deleted by the user.\n\nNote that this behaviour isn\u0027t actually forbidden by RFC 2367.\nHowever, it is a quality of implementation issue.\n\nAs an added bonus, the restructuring in this patch will help\neventually in moving the expire notifications from softirq\ncontext into process context, thus improving their reliability.\n\nOne important side-effect from this change is that SAs reaching\ntheir hard byte/packet limits are now deleted immediately, just\nlike SAs that have reached their hard time limits.\n\nPreviously they were announced immediately but only deleted after\n30 seconds.\n\nThis is bad because it prevents the system from issuing an ACQUIRE\ncommand until the existing state was deleted by the user or expires\nafter the time is up.\n\nIn the scenario where the expire notification was lost this introduces\na 30 second delay into the system for no good reason.\n \nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "26b15dad9f1c19d6d4f7b999b07eaa6d98e4b375",
      "tree": "2ca3039488d9df023fb84eaa7c1f52aa8d1ce69c",
      "parents": [
        "3aa3dfb372576f30835a94409556e3c8681b5756"
      ],
      "author": {
        "name": "Jamal Hadi Salim",
        "email": "hadi@cyberus.ca",
        "time": "Sat Jun 18 22:42:13 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Sat Jun 18 22:42:13 2005 -0700"
      },
      "message": "[IPSEC] Add complete xfrm event notification\n\nHeres the final patch.\nWhat this patch provides\n\n- netlink xfrm events\n- ability to have events generated by netlink propagated to pfkey\n  and vice versa.\n- fixes the acquire lets-be-happy-with-one-success issue\n\nSigned-off-by: Jamal Hadi Salim \u003chadi@cyberus.ca\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "92d63decc0b6a5d600f792fcf5f3ff9718c09a3d",
      "tree": "eca15d3ffba7795ea4d9bef9cdc6d21c7c71fa00",
      "parents": [
        "2f872f0401d4b470990864fbf99c19130f25ad4d"
      ],
      "author": {
        "name": "Hideaki YOSHIFUJI",
        "email": "yoshfuji@linux-ipv6.org",
        "time": "Thu May 26 12:58:04 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu May 26 12:58:04 2005 -0700"
      },
      "message": "From: Kazunori Miyazawa \u003ckazunori@miyazawa.org\u003e\n\n[XFRM] Call dst_check() with appropriate cookie\n\nThis fixes infinite loop issue with IPv6 tunnel mode.\n\nSigned-off-by: Kazunori Miyazawa \u003ckazunori@miyazawa.org\u003e\nSigned-off-by: Hideaki YOSHIFUJI \u003cyoshfuji@linux-ipv6.org\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "31c26852cb2ac77f1d4acb37bcf31f165fd5eb68",
      "tree": "ce2e98c79f4d9051baff55c5f5fdb90defb9e18e",
      "parents": [
        "b9e9dead05b19e7f52c9aa00cd3a5b7ac4fcacf4"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu May 19 12:39:49 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu May 19 12:39:49 2005 -0700"
      },
      "message": "[IPSEC]: Verify key payload in verify_one_algo\n\nWe need to verify that the payload contains enough data so that\nattach_one_algo can copy alg_key_len bits from the payload.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "b9e9dead05b19e7f52c9aa00cd3a5b7ac4fcacf4",
      "tree": "89852e61eaea7cd88c652e91b594fd8f4c312a9d",
      "parents": [
        "8be58932ca596972e4953ae980d8bc286857cae8"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Thu May 19 12:39:04 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Thu May 19 12:39:04 2005 -0700"
      },
      "message": "[IPSEC]: Fixed alg_key_len usage in attach_one_algo\n\nThe variable alg_key_len is in bits and not bytes.  The function\nattach_one_algo is currently using it as if it were in bytes.\nThis causes it to read memory which may not be there.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "d48102007d068df7ba3055cdc1723e12db1ba30f",
      "tree": "54f01cd1163bb552d5e1a647069663c4a28a1396",
      "parents": [
        "f7383c22246cfccbe912541dd83103009ed2b537"
      ],
      "author": {
        "name": "Evgeniy Polyakov",
        "email": "johnpol@2ka.mipt.ru",
        "time": "Wed May 18 22:51:45 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Wed May 18 22:51:45 2005 -0700"
      },
      "message": "[XFRM]: skb_cow_data() does not set proper owner for new skbs.\n\nIt looks like skb_cow_data() does not set \nproper owner for newly created skb.\n\nIf we have several fragments for skb and some of them\nare shared(?) or cloned (like in async IPsec) there \nmight be a situation when we require recreating skb and \nthus using skb_copy() for it.\nNewly created skb has neither a destructor nor a socket\nassotiated with it, which must be copied from the old skb.\nAs far as I can see, current code sets destructor and socket\nfor the first one skb only and uses truesize of the first skb\nonly to increment sk_wmem_alloc value.\n\nIf above \"analysis\" is correct then attached patch fixes that.\n\nSigned-off-by: Evgeniy Polyakov \u003cjohnpol@2ka.mipt.ru\u003e\nAcked-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "aabc9761b69f1bfa30a78f7005be95cc9cc06175",
      "tree": "50dc9f510011ac03656aeba0595b2b0b5c5f5e22",
      "parents": [
        "d5d75cd6b10ddad2f375b61092754474ad78aec7"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue May 03 16:27:10 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 03 16:27:10 2005 -0700"
      },
      "message": "[IPSEC]: Store idev entries\n\nI found a bug that stopped IPsec/IPv6 from working.  About\na month ago IPv6 started using rt6i_idev-\u003edev on the cached socket dst\nentries.  If the cached socket dst entry is IPsec, then rt6i_idev will\nbe NULL.\n\nSince we want to look at the rt6i_idev of the original route in this\ncase, the easiest fix is to store rt6i_idev in the IPsec dst entry just\nas we do for a number of other IPv6 route attributes.  Unfortunately\nthis means that we need some new code to handle the references to\nrt6i_idev.  That\u0027s why this patch is bigger than it would otherwise be.\n\nI\u0027ve also done the same thing for IPv4 since it is conceivable that\nonce these idev attributes start getting used for accounting, we\nprobably need to dereference them for IPv4 IPsec entries too.\n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "0f4821e7b93fe72e89b8ff393bd8e705bd178aa5",
      "tree": "e9116a4ce6593b186c3962fcdc5baf73f243d0b5",
      "parents": [
        "09e14305982efc2f3b509d3c50ef5dcbff64a998"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue May 03 16:15:59 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 03 16:15:59 2005 -0700"
      },
      "message": "[XFRM/RTNETLINK]: Decrement qlen properly in {xfrm_,rt}netlink_rcv().\n\nIf we free up a partially processed packet because it\u0027s\nskb-\u003elen dropped to zero, we need to decrement qlen because\nwe are dropping out of the top-level loop so it will do\nthe decrement for us.\n\nSpotted by Herbert Xu.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "09e14305982efc2f3b509d3c50ef5dcbff64a998",
      "tree": "7829c8b212a84e793ebf2d5bd0ceb68283c7b79e",
      "parents": [
        "2a0a6ebee1d68552152ae8d4aeda91d806995dec"
      ],
      "author": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Tue May 03 15:30:05 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 03 15:30:05 2005 -0700"
      },
      "message": "[NETLINK]: Fix infinite loops in synchronous netlink changes.\n\nThe qlen should continue to decrement, even if we\npop partially processed SKBs back onto the receive queue.\n\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "2a0a6ebee1d68552152ae8d4aeda91d806995dec",
      "tree": "a0b77861b3395b4728e75f2b2f92755e0a4777d3",
      "parents": [
        "96c36023434b7b6824b1da72a6b7b1ca61d7310c"
      ],
      "author": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue May 03 14:55:09 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 03 14:55:09 2005 -0700"
      },
      "message": "[NETLINK]: Synchronous message processing.\n\nLet\u0027s recap the problem.  The current asynchronous netlink kernel\nmessage processing is vulnerable to these attacks:\n\n1) Hit and run: Attacker sends one or more messages and then exits\nbefore they\u0027re processed.  This may confuse/disable the next netlink\nuser that gets the netlink address of the attacker since it may\nreceive the responses to the attacker\u0027s messages.\n\nProposed solutions:\n\na) Synchronous processing.\nb) Stream mode socket.\nc) Restrict/prohibit binding.\n\n2) Starvation: Because various netlink rcv functions were written\nto not return until all messages have been processed on a socket,\nit is possible for these functions to execute for an arbitrarily\nlong period of time.  If this is successfully exploited it could\nalso be used to hold rtnl forever.\n\nProposed solutions:\n\na) Synchronous processing.\nb) Stream mode socket.\n\nFirstly let\u0027s cross off solution c).  It only solves the first\nproblem and it has user-visible impacts.  In particular, it\u0027ll\nbreak user space applications that expect to bind or communicate\nwith specific netlink addresses (pid\u0027s).\n\nSo we\u0027re left with a choice of synchronous processing versus\nSOCK_STREAM for netlink.\n\nFor the moment I\u0027m sticking with the synchronous approach as\nsuggested by Alexey since it\u0027s simpler and I\u0027d rather spend\nmy time working on other things.\n\nHowever, it does have a number of deficiencies compared to the\nstream mode solution:\n\n1) User-space to user-space netlink communication is still vulnerable.\n\n2) Inefficient use of resources.  This is especially true for rtnetlink\nsince the lock is shared with other users such as networking drivers.\nThe latter could hold the rtnl while communicating with hardware which\ncauses the rtnetlink user to wait when it could be doing other things.\n\n3) It is still possible to DoS all netlink users by flooding the kernel\nnetlink receive queue.  The attacker simply fills the receive socket\nwith a single netlink message that fills up the entire queue.  The\nattacker then continues to call sendmsg with the same message in a loop.\n\nPoint 3) can be countered by retransmissions in user-space code, however\nit is pretty messy.\n\nIn light of these problems (in particular, point 3), we should implement\nstream mode netlink at some point.  In the mean time, here is a patch\nthat implements synchronous processing.  \n\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "492b558b3191319cbc859a9e025bc354d336c261",
      "tree": "44e4aef7da73c9d4fd0e31bdfe26399f52a9f0cd",
      "parents": [
        "526bdb80a23b2e10ed4ccc3fcf309c9118d892d6"
      ],
      "author": {
        "name": "Thomas Graf",
        "email": "tgraf@suug.ch",
        "time": "Tue May 03 14:26:40 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@davemloft.net",
        "time": "Tue May 03 14:26:40 2005 -0700"
      },
      "message": "[XFRM]: Cleanup xfrm_msg_min and xfrm_dispatch\n\nConverts xfrm_msg_min and xfrm_dispatch to use c99 designated\ninitializers to make greping a little bit easier. Also replaces\ntwo hardcoded message type with meaningful names.\n\nSigned-off-by: Thomas Graf \u003ctgraf@suug.ch\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "5c5d281a93e9816966b6131ccec19519dab0e103",
      "tree": "a897ec464a600d7a678052bfd5e52378470a45fe",
      "parents": [
        "7938109fff944e0117976a39946d99d2b0b0250d"
      ],
      "author": {
        "name": "Patrick McHardy",
        "email": "kaber@trash.net",
        "time": "Thu Apr 21 20:12:32 2005 -0700"
      },
      "committer": {
        "name": "David S. Miller",
        "email": "davem@sunset.davemloft.net",
        "time": "Thu Apr 21 20:12:32 2005 -0700"
      },
      "message": "[XFRM]: Fix existence lookup in xfrm_state_find\n\nUse \u0027daddr\u0027 instead of \u0026tmpl-\u003eid.daddr, since the latter\nmight be zero.  Also, only perform the lookup when\ntmpl-\u003eid.spi is non-zero.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n"
    },
    {
      "commit": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
      "tree": "0bba044c4ce775e45a88a51686b5d9f90697ea9d",
      "parents": [],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@ppc970.osdl.org",
        "time": "Sat Apr 16 15:20:36 2005 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@ppc970.osdl.org",
        "time": "Sat Apr 16 15:20:36 2005 -0700"
      },
      "message": "Linux-2.6.12-rc2\n\nInitial git repository build. I\u0027m not bothering with the full history,\neven though we have it. We can create a separate \"historical\" git\narchive of that later if we want to, and in the meantime it\u0027s about\n3.2GB when imported into git - space that would just make the early\ngit days unnecessarily complicated, when we don\u0027t have a lot of good\ninfrastructure for it.\n\nLet it rip!\n"
    }
  ]
}
