summaryrefslogtreecommitdiff
path: root/net/ax25
AgeCommit message (Expand)AuthorFilesLines
2017-01-16ax25: Fix segfault after sock connection timeoutBasil Gunn1-1/+1
2016-12-24Replace <asm/uaccess.h> with <linux/uaccess.h> globallyLinus Torvalds17-17/+17
2016-06-18AX.25: Close socket connection on session completionBasil Gunn4-4/+12
2016-03-09ax25: add link layer header validation functionWillem de Bruijn1-0/+15
2015-12-14net: add validation for the socket syscall protocol argumentHannes Frederic Sowa1-0/+3
2015-07-15NET: AX.25: Stop heartbeat timer on disconnect.Richard Stearn1-0/+1
2015-06-28ax25: Stop using sock->sk_protinfo.David Miller2-16/+16
2015-06-18netfilter: Remove spurios included of netfilter.hEric W Biederman5-5/+0
2015-05-11net: Pass kern from net_proto_family.create to sk_allocEric W. Biederman1-2/+2
2015-03-05ax25: Fix the build when CONFIG_INET is disabledkbuild test robot1-1/+1
2015-03-03ax25: Stop using magic neighbour cache operations.Eric W. Biederman1-54/+6
2015-03-02ax25: Stop depending on arp_findEric W. Biederman1-12/+28
2015-03-02ax25: Stop calling/abusing dev_rebuild_headerEric W. Biederman1-8/+2
2015-03-02neigh: Move neigh_compat_output into ax25_ip.cEric W. Biederman1-2/+16
2015-03-02ax25: Refactor to use private neighbour operations.Eric W. Biederman1-0/+21
2015-03-02ax25: Make ax25_header and ax25_rebuild_header staticEric W. Biederman1-10/+8
2015-03-02ax25: In ax25_rebuild_header add missing kfree_skbEric W. Biederman1-0/+1
2015-03-02net: Remove iocb argument from sendmsg and recvmsgYing Xue1-4/+3
2014-11-24new helper: memcpy_from_msg()Al Viro1-1/+1
2014-11-05net: Add and use skb_copy_datagram_msg() helper.David S. Miller1-1/+1
2014-04-11net: Fix use after free by removing length arg from sk_data_ready callbacks.David S. Miller1-1/+1
2014-01-18net: add build-time checks for msg->msg_name sizeSteffen Hurrle1-2/+2
2013-11-20net: rework recvmsg handler msg_name and msg_namelen logicHannes Frederic Sowa1-2/+2
2013-10-18ax25: cleanup a range testDan Carpenter1-1/+1
2013-06-13net: Convert uses of typedef ctl_table to struct ctl_tableJoe Perches1-1/+1
2013-05-28net: pass info struct via netdevice notifierJiri Pirko1-3/+3
2013-04-07ax25: fix info leak via msg_name in ax25_recvmsg()Mathias Krause1-0/+1
2013-02-27hlist: drop the node parameter from iteratorsSasha Levin5-25/+13
2013-02-18net: proc: change proc_net_remove to remove_proc_entryGao feng1-3/+3
2013-02-18net: proc: change proc_net_fops_create to proc_createGao feng1-3/+4
2012-08-14userns: Convert net/ax25 to use kuid_t where appropriateEric W. Biederman1-7/+14
2012-07-19Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller1-0/+1
2012-07-16ax25: Fix missing breakAlan Cox1-0/+1
2012-07-09small cleanup in ax25_addr_parse()Dan Carpenter1-2/+4
2012-06-04net: use consume_skb() in place of kfree_skb()Eric Dumazet2-2/+2
2012-04-23Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller1-3/+4
2012-04-20net ax25: Simplify and cleanup the ax25 sysctl handling.Eric W. Biederman3-64/+30
2012-04-20net: Move all of the network sysctls without a namespace into init_net.Eric W. Biederman1-2/+2
2012-04-19net ax25: Reorder ax25_exit to remove races.Eric W. Biederman1-4/+5
2012-04-15net: cleanup unsigned to unsigned intEric Dumazet1-2/+2
2012-03-28Remove all #inclusions of asm/system.hDavid Howells17-17/+0
2011-12-28ax25: avoid overflows in ax25_setsockopt()Xi Wang1-5/+6
2011-11-29NET: AX.25: Check ioctl arguments to avoid overflows further down the road.Ralf Baechle1-6/+11
2011-10-31net: Add export.h for EXPORT_SYMBOL/THIS_MODULE to non-modulesPaul Gortmaker2-0/+2
2011-04-17ax25: Fix set-but-unused variable.David S. Miller1-2/+1
2011-04-14NET: AX.25, NETROM, ROSE: Remove SOCK_DEBUG callsRalf Baechle1-15/+1
2011-01-12net: ax25: fix information leak to userland harderKees Cook1-1/+1
2010-11-10net: ax25: fix information leak to userlandVasiliy Kulikov1-1/+1
2010-10-24Merge branch 'for-next' of git://git.kernel.org/pub/scm/linux/kernel/git/jiko...Linus Torvalds1-4/+4
2010-10-18Update broken web addresses in the kernel.Justin P. Mattock1-4/+4