summaryrefslogtreecommitdiffstats
path: root/net/ipv6
Commit message (Expand)AuthorAgeFilesLines
* ip6mr: Fix notifiers call on mroute_clean_tables()Nir Dotan2019-01-271-4/+3
* net/ipv6: lower the level of "link is not ready" messagesLubomir Rintel2019-01-221-2/+2
* net/ipv6: don't return positive numbers when nothing was dumpedJakub Kicinski2019-01-221-0/+2
* net: ip_gre: use erspan key field for tunnel lookupLorenzo Bianconi2019-01-221-4/+0
* udp6: add missing rehash callback to udpliteAlexey Kodanev2019-01-173-1/+3
* udp: with udp_segment release on error pathWillem de Bruijn2019-01-161-4/+12
* ipv6: route: place a warning with duplicated string with correct extackJakub Kicinski2019-01-161-12/+2
* erspan: build the header with the right proto according to erspan_verXin Long2019-01-161-2/+4
* fou, fou6: do not assume linear skbsEric Dumazet2019-01-151-2/+7
* ip6_gre: update version related info when changing linkHangbin Liu2019-01-151-0/+4
* ip6_gre: fix tunnel list corruption for x-netnsOlivier Matz2019-01-151-2/+2
* ipv6: fix kernel-infoleak in ipv6_local_error()Eric Dumazet2019-01-101-0/+1
* ip: on queued skb use skb_header_pointer instead of pskb_may_pullWillem de Bruijn2019-01-101-6/+4
* Merge ra.kernel.org:/pub/scm/linux/kernel/git/bpf/bpfDavid S. Miller2019-01-071-4/+4
|\
| * bpf: Fix [::] -> [::1] rewrite in sys_sendmsgAndrey Ignatov2019-01-041-4/+4
* | ipv6: Take rcu_read_lock in __inet6_bind for mapped addressesDavid Ahern2019-01-051-1/+4
|/
* ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped addressDavid Ahern2019-01-041-1/+10
* ipv6: make icmp6_send() robust against null skb->devEric Dumazet2019-01-041-2/+6
* fou6: Prevent unbounded recursion in GUE error handlerStefano Brivio2019-01-041-0/+8
* netlink: fixup regression in RTM_GETADDRArthur Gautier2019-01-041-1/+1
* ipv6: Consider sk_bound_dev_if when binding a socket to an addressDavid Ahern2019-01-021-0/+3
* ipv6: Fix dump of specific table with strict checkingDavid Ahern2019-01-021-1/+5
* ipv6: route: Fix return value of ip6_neigh_lookup() on neigh_create() errorStefano Brivio2019-01-021-1/+3
* ip: validate header length on virtual device xmitWillem de Bruijn2019-01-015-20/+28
* ipv6: fix typo in net/ipv6/reassembly.cSu Yanjun2018-12-301-1/+1
* net/ipv6: Fix a test against 'ipv6_find_idev()' return valueChristophe JAILLET2018-12-301-2/+2
* ipv6/route: Add a missing check on proc_dointvecAditya Pakki2018-12-271-1/+5
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller2018-12-213-0/+3
|\
| * ipv6: tunnels: fix two use-after-freeEric Dumazet2018-12-212-0/+2
| * ipv6: frags: Fix bogus skb->sk in reassembled packetsHerbert Xu2018-12-201-0/+1
* | Merge git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-nextDavid S. Miller2018-12-203-129/+6
|\ \
| * | netfilter: nat: remove nf_nat_l4proto structFlorian Westphal2018-12-173-46/+4
| * | netfilter: nat: remove l4proto->manip_pktFlorian Westphal2018-12-172-28/+2
| * | netfilter: nat: remove l4proto->nlattr_to_rangeFlorian Westphal2018-12-171-3/+0
| * | netfilter: nat: remove l4proto->in_rangeFlorian Westphal2018-12-171-11/+0
| * | netfilter: nat: fold in_range indirection into callerFlorian Westphal2018-12-171-8/+0
| * | netfilter: nat: remove l4proto->unique_tupleFlorian Westphal2018-12-171-26/+0
| * | netfilter: remove NF_NAT_RANGE_PROTO_RANDOM supportFlorian Westphal2018-12-171-7/+0
* | | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller2018-12-204-1/+9
|\ \ \ | | |/ | |/|
| * | ipv6: explicitly initialize udp6_addr in udp_sock_create6()Cong Wang2018-12-191-1/+2
| * | net: add missing SOF_TIMESTAMPING_OPT_ID supportWillem de Bruijn2018-12-171-1/+1
| * | ipv6: add missing tx timestamping on IPPROTO_RAWWillem de Bruijn2018-12-171-0/+2
| * | net: clear skb->tstamp in forwarding pathsEric Dumazet2018-12-151-0/+1
| * | ip6mr: Fix potential Spectre v1 vulnerabilityGustavo A. R. Silva2018-12-141-0/+4
* | | Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/klasse...David S. Miller2018-12-201-0/+3
|\ \ \
| * | | xfrm6_tunnel: Fix spi check in __xfrm6_tunnel_alloc_spiYueHaibing2018-12-191-0/+3
* | | | net: use skb_sec_path helper in more placesFlorian Westphal2018-12-193-5/+10
* | | | xfrm: change secpath_set to return secpath struct, not error valueFlorian Westphal2018-12-192-7/+10
* | | | sk_buff: add skb extension infrastructureFlorian Westphal2018-12-191-0/+1
* | | | netfilter: avoid using skb->nf_bridge directlyFlorian Westphal2018-12-191-3/+7
|/ / /