summaryrefslogtreecommitdiffstats
path: root/net
Commit message (Expand)AuthorAgeFilesLines
* ieee802154: Fix sockaddr_ieee802154 implicit padding information leak.Lennert Buytenhek2015-07-151-0/+6
* SUNRPC: Fix a memory leak in the backchannel codeTrond Myklebust2015-07-151-1/+1
* sctp: Fix race between OOTB responce and route removalAlexander Sverdlin2015-07-061-1/+3
* tcp: Do not call tcp_fastopen_reset_cipher from interrupt contextChristoph Paasch2015-07-063-4/+7
* neigh: do not modify unlinked entriesJulian Anastasov2015-07-061-0/+13
* packet: avoid out of bounds read in round robin fanoutWillem de Bruijn2015-07-061-16/+2
* packet: read num_members once in packet_rcv_fanout()Eric Dumazet2015-07-061-1/+1
* bridge: fix br_stp_set_bridge_priority race conditionsNikolay Aleksandrov2015-07-062-3/+3
* sctp: fix ASCONF list handlingMarcelo Ricardo Leitner2015-07-061-11/+32
* net: don't wait for order-3 page allocationShaohua Li2015-07-062-2/+6
* bridge: fix multicast router rlist endless loopNikolay Aleksandrov2015-07-061-4/+3
* cfg80211: wext: clear sinfo struct before calling driverJohannes Berg2015-06-301-0/+2
* bridge: disable softirqs around br_fdb_update to avoid lockupNikolay Aleksandrov2015-06-121-0/+2
* ipv4/udp: Verify multicast group is ours in upd_v4_early_demux()Shawn Bohrer2015-06-121-3/+15
* udp: fix behavior of wrong checksumsEric Dumazet2015-06-122-8/+4
* unix/caif: sk_socket can disappear when state is unlockedMark Salyzyn2015-06-122-0/+16
* net: core: Correct an over-stringent device loop detection.Vlad Yasevich2015-06-121-1/+1
* xfrm: fix a race in xfrm_state_lookup_byspiLi RongQing2015-06-111-1/+1
* net_sched: invoke ->attach() after setting dev->qdiscWANG Cong2015-06-031-4/+6
* mac80211: don't use napi_gro_receive() outside NAPI contextJohannes Berg2015-06-032-2/+6
* bridge: fix parsing of MLDv2 reportsThadeu Lima de Souza Cascardo2015-06-021-1/+1
* ipv4: Avoid crashing in ip_errorEric W. Biederman2015-06-021-0/+4
* ipv6: fix ECMP route replacementMichal Kubeček2015-06-022-6/+44
* ipv6: do not delete previously existing ECMP routes if add failsMichal Kubeček2015-06-021-1/+2
* tcp/ipv6: fix flow label setting in TIME_WAIT stateFlorent Fourcot2015-06-022-2/+2
* ipvs: fix memory leak in ip_vs_ctl.cTommi Rantala2015-06-021-0/+3
* libceph: request a new osdmap if lingering request maps to no osdIlya Dryomov2015-06-021-11/+20
* mac80211: move WEP tailroom size checkJanusz Dziedzic2015-06-021-2/+4
* net: socket: Fix the wrong returns for recvmsg and sendmsgJunling Zheng2015-06-021-14/+10
* svcrpc: fix potential GSSX_ACCEPT_SEC_CONTEXT decoding failuresScott Mayhew2015-05-281-7/+16
* xprtrdma: Free the pd if ib_query_qp() failsChuck Lever2015-05-201-3/+7
* netfilter: nft_rbtree: fix lockingPatrick McHardy2015-05-201-4/+2
* netfilter: nf_tables: allow to change chain policy without hook if it existsPablo Neira Ayuso2015-05-201-1/+4
* netfilter: nft_compat: set IP6T_F_PROTO flag if protocol is setPablo Neira Ayuso2015-05-201-0/+6
* netfilter: nf_tables: check for overflow of rule dlen fieldPatrick McHardy2015-05-201-0/+4
* netfilter: Zero the tuple in nfnl_cthelper_parse_tuple()Ian Wilson2015-05-201-0/+3
* netfilter: nf_tables: fix error handling of rule replacementPablo Neira Ayuso2015-05-201-6/+0
* crush: ensuring at most num-rep osds are selectedIlya Dryomov2015-05-201-4/+12
* net: make skb_gso_segment error handling more robustFlorian Westphal2015-05-204-2/+6
* bridge/mdb: remove wrong use of NLM_F_MULTINicolas Dichtel2015-05-121-1/+1
* ipv4: Missing sk_nulls_node_init() in ping_unhash().David S. Miller2015-05-061-0/+1
* skbuff: Do not scrub skb mark within the same name spaceHerbert Xu2015-05-061-3/+6
* vti6: fix uninit when using x-netnsYao Xiwei2015-05-061-2/+1
* xprtrdma: Prevent infinite loop in rpcrdma_ep_create()Chuck Lever2015-05-061-2/+3
* net: fix crash in build_skb()Eric Dumazet2015-04-292-13/+24
* net: do not deplete pfmemalloc reserveEric Dumazet2015-04-291-2/+7
* tcp: avoid looping in tcp_send_fin()Eric Dumazet2015-04-291-21/+29
* tcp: fix possible deadlock in tcp_send_fin()Eric Dumazet2015-04-291-1/+19
* ip_forward: Drop frames with attached skb->skSebastian Pöhn2015-04-291-0/+3
* tcp: tcp_make_synack() should clear skb->tstampEric Dumazet2015-04-271-0/+2