summaryrefslogtreecommitdiffstats
path: root/net/x25
AgeCommit message (Expand)AuthorFilesLines
2019-02-23net/x25: fix a race in x25_bind()Eric Dumazet1-5/+8
2019-02-11net/x25: do not hold the cpu too long in x25_new_lci()Eric Dumazet1-4/+2
2018-11-29net/x25: handle call collisionsMartin Schiller1-0/+9
2018-11-29net/x25: fix null_x25_address handlingMartin Schiller1-6/+10
2018-11-29net/x25: fix called/calling length calculation in x25_parse_address_blockMartin Schiller1-1/+1
2018-07-24x25: remove blank lines at EOFStephen Hemminger2-3/+0
2018-06-28Revert changes to convert to ->poll_mask() and aio IOCB_CMD_POLLLinus Torvalds1-1/+1
2018-06-04Merge branch 'work.aio-1' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds1-1/+1
2018-05-26net: convert datagram_poll users tp ->poll_maskChristoph Hellwig1-1/+1
2018-05-16proc: introduce proc_create_seq{,_data}Christoph Hellwig1-42/+6
2018-03-26net: Use octal not symbolic permissionsJoe Perches1-6/+6
2018-02-20x25: use %*ph to print small bufferAntonio Cardace1-2/+1
2018-02-12net: make getname() functions return length rather than use int* parameterDenys Vlasenko1-2/+2
2017-11-21treewide: Remove TIMER_FUNC_TYPE and TIMER_DATA_TYPE castsKees Cook2-2/+2
2017-11-21treewide: setup_timer() -> timer_setup()Kees Cook1-4/+4
2017-11-04Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller2-0/+2
2017-11-02License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseGreg Kroah-Hartman2-0/+2
2017-10-22net: x25: mark expected switch fall-throughsGustavo A. R. Silva2-1/+2
2017-10-18net/core: Convert sk_timer users to use timer_setup()Kees Cook2-11/+14
2017-10-18net/core: Collapse redundant sk_timer callback data assignmentsKees Cook2-2/+0
2017-08-03X25: constify null_x25_addressJulia Lawall1-1/+1
2017-07-04net, x25: convert x25_neigh.refcnt from atomic_t to refcount_tReshetova, Elena1-1/+1
2017-07-04net, x25: convert x25_route.refcnt from atomic_t to refcount_tReshetova, Elena1-1/+1
2017-06-20net: manual clean code which call skb_put_[data:zero]yuan linyu1-8/+8
2017-06-16networking: introduce and use skb_put_data()Johannes Berg1-13/+8
2017-05-18net: x25: fix one potential use-after-free issuelinzhang2-9/+20
2017-03-09net: Work around lockdep limitation in sockets that use socketsDavid Howells1-1/+2
2017-03-02sched/headers: Prepare for new header dependencies before moving code to <lin...Ingo Molnar1-1/+1
2016-12-24Replace <asm/uaccess.h> with <linux/uaccess.h> globallyLinus Torvalds2-2/+2
2016-12-17net/x25: use designated initializersKees Cook1-1/+1
2016-09-09net: x25: remove null checks on arrays calling_ae and called_aeColin Ian King1-4/+0
2016-05-09net: fix a kernel infoleak in x25 moduleKangjie Lu1-0/+1
2015-05-11net: Pass kern from net_proto_family.create to sk_allocEric W. Biederman1-4/+4
2015-03-02net: Remove iocb argument from sendmsg and recvmsgYing Xue1-4/+2
2014-11-24new helper: memcpy_from_msg()Al Viro1-1/+1
2014-11-05net: Add and use skb_copy_datagram_msg() helper.David S. Miller1-1/+1
2014-04-11net: Fix use after free by removing length arg from sk_data_ready callbacks.David S. Miller2-2/+2
2014-01-18net: add build-time checks for msg->msg_name sizeSteffen Hurrle1-2/+2
2013-12-09x25: convert printks to pr_<level>wangweidong7-17/+32
2013-11-20net: rework recvmsg handler msg_name and msg_namelen logicHannes Frederic Sowa1-2/+1
2013-10-29net: x25: Fix dead URLs in KconfigMichael DrĂ¼ing1-2/+2
2013-09-04x25: add a sanity check parsing X.25 facilitiesDan Carpenter1-0/+4
2013-07-01x25: Fix broken locking in ioctl error paths.Dave Jones1-7/+8
2013-05-28net: pass info struct via netdevice notifierJiri Pirko1-1/+1
2013-04-09x25: use proc_remove_subtree()Al Viro1-33/+14
2013-02-27hlist: drop the node parameter from iteratorsSasha Levin1-8/+4
2013-01-11net/x25: remove depends on CONFIG_EXPERIMENTALKees Cook1-2/+1
2012-07-10net: Fix (nearly-)kernel-doc comments for various functionsBen Hutchings1-1/+1
2012-04-23net: add a limit parameter to sk_add_backlog()Eric Dumazet1-1/+1
2012-04-20net: Convert all sysctl registrations to register_net_sysctlEric W. Biederman1-7/+1