]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
network .25 patches added
authorGreg Kroah-Hartman <gregkh@suse.de>
Fri, 25 Jul 2008 22:40:08 +0000 (15:40 -0700)
committerGreg Kroah-Hartman <gregkh@suse.de>
Fri, 25 Jul 2008 22:40:08 +0000 (15:40 -0700)
queue-2.6.25/0001-hdlcdrv-Fix-CRC-calculation.patch [new file with mode: 0644]
queue-2.6.25/0002-ipv6-__KERNEL__-ifdef-struct-ipv6_devconf.patch [new file with mode: 0644]
queue-2.6.25/0003-ipv6-use-timer-pending.patch [new file with mode: 0644]
queue-2.6.25/0004-l2tp-Fix-potential-memory-corruption-in-pppol2tp_re.patch [new file with mode: 0644]
queue-2.6.25/0005-net-pppoe-Check-packet-length-on-all-receive-paths.patch [new file with mode: 0644]
queue-2.6.25/0006-pppoe-Unshare-skb-before-anything-else.patch [new file with mode: 0644]
queue-2.6.25/0007-raw-Restore-proc-net-raw-correct-behavior.patch [new file with mode: 0644]
queue-2.6.25/0008-xfrm-fix-fragmentation-for-ipv4-xfrm-tunnel.patch [new file with mode: 0644]
queue-2.6.25/0009-udplite-Protection-against-coverage-value-wrap-arou.patch [new file with mode: 0644]
queue-2.6.25/series [new file with mode: 0644]

diff --git a/queue-2.6.25/0001-hdlcdrv-Fix-CRC-calculation.patch b/queue-2.6.25/0001-hdlcdrv-Fix-CRC-calculation.patch
new file mode 100644 (file)
index 0000000..f79dcd2
--- /dev/null
@@ -0,0 +1,35 @@
+From bd51f289fc5f3e3ae17a360209a2848ce9c4ac7d Mon Sep 17 00:00:00 2001
+From: Micah Dowty <micah@navi.cx>
+Date: Wed, 23 Jul 2008 23:46:31 -0700
+Subject: hdlcdrv: Fix CRC calculation.
+
+From: Micah Dowty <micah@navi.cx>
+
+[ Upstream commit ae6134bdf3197206fba95563d755d2fa50d90ddd ]
+
+This is a trivial patch against the hdlcdrv module that fixes its CRC
+calculation. The finished CRC was overwriting the first two bytes of
+each packet rather than being appended to the end.
+
+I've tested this with 2.6.8 and 2.6.10-rc1, but hdlcdrv hasn't changed
+much recently so it should work with many other kernel versions.
+
+Signed-off-by: Micah Dowty <micah@navi.cx>
+Acked-by: Thomas Sailer <t.sailer@alumni.ethz.ch>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
+
+---
+ drivers/net/hamradio/hdlcdrv.c |    1 +
+ 1 file changed, 1 insertion(+)
+
+--- a/drivers/net/hamradio/hdlcdrv.c
++++ b/drivers/net/hamradio/hdlcdrv.c
+@@ -88,6 +88,7 @@
+ static inline void append_crc_ccitt(unsigned char *buffer, int len)
+ {
+       unsigned int crc = crc_ccitt(0xffff, buffer, len) ^ 0xffff;
++      buffer += len;
+       *buffer++ = crc;
+       *buffer++ = crc >> 8;
+ }
diff --git a/queue-2.6.25/0002-ipv6-__KERNEL__-ifdef-struct-ipv6_devconf.patch b/queue-2.6.25/0002-ipv6-__KERNEL__-ifdef-struct-ipv6_devconf.patch
new file mode 100644 (file)
index 0000000..6d4ceb6
--- /dev/null
@@ -0,0 +1,36 @@
+From 080330d99b5e3ffab6fb5225a35f330cb777d085 Mon Sep 17 00:00:00 2001
+From: David S. Miller <davem@davemloft.net>
+Date: Wed, 23 Jul 2008 23:49:26 -0700
+Subject: ipv6: __KERNEL__ ifdef struct ipv6_devconf
+
+From: David S. Miller <davem@davemloft.net>
+
+[ Upstream commit ebb36a978131810c98e7198b1187090c697cf99f ]
+
+Based upon a report by Olaf Hering.
+
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
+
+---
+ include/linux/ipv6.h |    2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/include/linux/ipv6.h
++++ b/include/linux/ipv6.h
+@@ -123,6 +123,7 @@ struct ipv6hdr {
+       struct  in6_addr        daddr;
+ };
++#ifdef __KERNEL__
+ /*
+  * This structure contains configuration options per IPv6 link.
+  */
+@@ -162,6 +163,7 @@ struct ipv6_devconf {
+ #endif
+       void            *sysctl;
+ };
++#endif
+ /* index values for the variables in ipv6_devconf */
+ enum {
diff --git a/queue-2.6.25/0003-ipv6-use-timer-pending.patch b/queue-2.6.25/0003-ipv6-use-timer-pending.patch
new file mode 100644 (file)
index 0000000..e2c97be
--- /dev/null
@@ -0,0 +1,41 @@
+From a9cd2e442b4c20b71b986d752e19560e75ae8a3f Mon Sep 17 00:00:00 2001
+From: Stephen Hemminger <shemminger@vyatta.com>
+Date: Wed, 23 Jul 2008 23:52:07 -0700
+Subject: ipv6: use timer pending
+
+From: Stephen Hemminger <shemminger@vyatta.com>
+
+[ Upstream commit 847499ce71bdcc8fc542062df6ebed3e596608dd ]
+
+This fixes the bridge reference count problem and cleanups ipv6 FIB
+timer management.  Don't use expires field, because it is not a proper
+way to test, instead use timer_pending().
+
+Signed-off-by: Stephen Hemminger <shemminger@vyatta.com>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
+
+---
+ net/ipv6/ip6_fib.c |    4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+--- a/net/ipv6/ip6_fib.c
++++ b/net/ipv6/ip6_fib.c
+@@ -679,7 +679,7 @@ static int fib6_add_rt2node(struct fib6_
+ static __inline__ void fib6_start_gc(struct rt6_info *rt)
+ {
+-      if (ip6_fib_timer.expires == 0 &&
++      if (!timer_pending(&ip6_fib_timer) &&
+           (rt->rt6i_flags & (RTF_EXPIRES|RTF_CACHE)))
+               mod_timer(&ip6_fib_timer, jiffies +
+                         init_net.ipv6.sysctl.ip6_rt_gc_interval);
+@@ -687,7 +687,7 @@ static __inline__ void fib6_start_gc(str
+ void fib6_force_start_gc(void)
+ {
+-      if (ip6_fib_timer.expires == 0)
++      if (!timer_pending(&ip6_fib_timer))
+               mod_timer(&ip6_fib_timer, jiffies +
+                         init_net.ipv6.sysctl.ip6_rt_gc_interval);
+ }
diff --git a/queue-2.6.25/0004-l2tp-Fix-potential-memory-corruption-in-pppol2tp_re.patch b/queue-2.6.25/0004-l2tp-Fix-potential-memory-corruption-in-pppol2tp_re.patch
new file mode 100644 (file)
index 0000000..eadd84c
--- /dev/null
@@ -0,0 +1,57 @@
+From b353161d26afcee637d2cc91d98c050853c02cea Mon Sep 17 00:00:00 2001
+From: James Chapman <jchapman@katalix.com>
+Date: Wed, 23 Jul 2008 23:52:47 -0700
+Subject: l2tp: Fix potential memory corruption in pppol2tp_recvmsg()
+
+From: James Chapman <jchapman@katalix.com>
+
+[ Upstream commit 6b6707a50c7598a83820077393f8823ab791abf8 ]
+
+This patch fixes a potential memory corruption in
+pppol2tp_recvmsg(). If skb->len is bigger than the caller's buffer
+length, memcpy_toiovec() will go into unintialized data on the kernel
+heap, interpret it as an iovec and start modifying memory.
+
+The fix is to change the memcpy_toiovec() call to
+skb_copy_datagram_iovec() so that paged packets (rare for PPPOL2TP)
+are handled properly. Also check that the caller's buffer is big
+enough for the data and set the MSG_TRUNC flag if it is not so.
+
+Reported-by: Ilja <ilja@netric.org>
+Signed-off-by: James Chapman <jchapman@katalix.com>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
+
+---
+ drivers/net/pppol2tp.c |   20 ++++++++++++--------
+ 1 file changed, 12 insertions(+), 8 deletions(-)
+
+--- a/drivers/net/pppol2tp.c
++++ b/drivers/net/pppol2tp.c
+@@ -783,14 +783,18 @@ static int pppol2tp_recvmsg(struct kiocb
+       err = 0;
+       skb = skb_recv_datagram(sk, flags & ~MSG_DONTWAIT,
+                               flags & MSG_DONTWAIT, &err);
+-      if (skb) {
+-              err = memcpy_toiovec(msg->msg_iov, (unsigned char *) skb->data,
+-                                   skb->len);
+-              if (err < 0)
+-                      goto do_skb_free;
+-              err = skb->len;
+-      }
+-do_skb_free:
++      if (!skb)
++              goto end;
++
++      if (len > skb->len)
++              len = skb->len;
++      else if (len < skb->len)
++              msg->msg_flags |= MSG_TRUNC;
++
++      err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, len);
++      if (likely(err == 0))
++              err = len;
++
+       kfree_skb(skb);
+ end:
+       return err;
diff --git a/queue-2.6.25/0005-net-pppoe-Check-packet-length-on-all-receive-paths.patch b/queue-2.6.25/0005-net-pppoe-Check-packet-length-on-all-receive-paths.patch
new file mode 100644 (file)
index 0000000..c29e38b
--- /dev/null
@@ -0,0 +1,100 @@
+From 8413d14ad58742635983809c1f36a54133591a3d Mon Sep 17 00:00:00 2001
+From: Herbert Xu <herbert@gondor.apana.org.au>
+Date: Thu, 24 Jul 2008 00:10:02 -0700
+Subject: net pppoe: Check packet length on all receive paths
+
+From: Herbert Xu <herbert@gondor.apana.org.au>
+
+[ Upstream commit 392fdb0e35055b96faa9c1cd6ab537805337cdce ]
+
+The length field in the PPPOE header wasn't checked completely.
+This patch causes all packets shorter than the declared length
+to be dropped.
+
+It also changes the memcpy_toiovec call to skb_copy_datagram_iovec
+so that paged packets (rare for PPPOE) are handled properly.
+
+Thanks to Ilja of the Netric Security Team for discovering and
+reporting this bug, and Chris Wright for the total_len check.
+
+[ Incorporate warning fix from Stephen Hemminger. -DaveM ]
+
+Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
+
+---
+ drivers/net/pppoe.c |   31 +++++++++++++++++--------------
+ 1 file changed, 17 insertions(+), 14 deletions(-)
+
+--- a/drivers/net/pppoe.c
++++ b/drivers/net/pppoe.c
+@@ -341,12 +341,6 @@ static int pppoe_rcv_core(struct sock *s
+       struct pppox_sock *relay_po;
+       if (sk->sk_state & PPPOX_BOUND) {
+-              struct pppoe_hdr *ph = pppoe_hdr(skb);
+-              int len = ntohs(ph->length);
+-              skb_pull_rcsum(skb, sizeof(struct pppoe_hdr));
+-              if (pskb_trim_rcsum(skb, len))
+-                      goto abort_kfree;
+-
+               ppp_input(&po->chan, skb);
+       } else if (sk->sk_state & PPPOX_RELAY) {
+               relay_po = get_item_by_addr(&po->pppoe_relay);
+@@ -357,7 +351,6 @@ static int pppoe_rcv_core(struct sock *s
+               if ((sk_pppox(relay_po)->sk_state & PPPOX_CONNECTED) == 0)
+                       goto abort_put;
+-              skb_pull(skb, sizeof(struct pppoe_hdr));
+               if (!__pppoe_xmit(sk_pppox(relay_po), skb))
+                       goto abort_put;
+       } else {
+@@ -388,6 +381,7 @@ static int pppoe_rcv(struct sk_buff *skb
+ {
+       struct pppoe_hdr *ph;
+       struct pppox_sock *po;
++      int len;
+       if (!(skb = skb_share_check(skb, GFP_ATOMIC)))
+               goto out;
+@@ -399,10 +393,21 @@ static int pppoe_rcv(struct sk_buff *skb
+               goto drop;
+       ph = pppoe_hdr(skb);
++      len = ntohs(ph->length);
++
++      skb_pull_rcsum(skb, sizeof(*ph));
++      if (skb->len < len)
++              goto drop;
+       po = get_item(ph->sid, eth_hdr(skb)->h_source, dev->ifindex);
+-      if (po != NULL)
+-              return sk_receive_skb(sk_pppox(po), skb, 0);
++      if (!po)
++              goto drop;
++
++      if (pskb_trim_rcsum(skb, len))
++              goto drop;
++
++      return sk_receive_skb(sk_pppox(po), skb, 0);
++
+ drop:
+       kfree_skb(skb);
+ out:
+@@ -937,12 +942,10 @@ static int pppoe_recvmsg(struct kiocb *i
+       m->msg_namelen = 0;
+       if (skb) {
+-              struct pppoe_hdr *ph = pppoe_hdr(skb);
+-              const int len = ntohs(ph->length);
+-
+-              error = memcpy_toiovec(m->msg_iov, (unsigned char *) &ph->tag[0], len);
++              total_len = min_t(size_t, total_len, skb->len);
++              error = skb_copy_datagram_iovec(skb, 0, m->msg_iov, total_len);
+               if (error == 0)
+-                      error = len;
++                      error = total_len;
+       }
+       kfree_skb(skb);
diff --git a/queue-2.6.25/0006-pppoe-Unshare-skb-before-anything-else.patch b/queue-2.6.25/0006-pppoe-Unshare-skb-before-anything-else.patch
new file mode 100644 (file)
index 0000000..697fb72
--- /dev/null
@@ -0,0 +1,38 @@
+From c50c3d4081576430f8da58db7f35d12f559c3c1a Mon Sep 17 00:00:00 2001
+From: Herbert Xu <herbert@gondor.apana.org.au>
+Date: Wed, 23 Jul 2008 23:53:55 -0700
+Subject: pppoe: Unshare skb before anything else
+
+From: Herbert Xu <herbert@gondor.apana.org.au>
+
+[ Upstream commit bc6cffd177f9266af38dba96a2cea06c1e7ff932 ]
+
+We need to unshare the skb first as otherwise pskb_may_pull may
+write to a shared skb which could be bad.
+
+Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
+
+---
+ drivers/net/pppoe.c |    6 +++---
+ 1 file changed, 3 insertions(+), 3 deletions(-)
+
+--- a/drivers/net/pppoe.c
++++ b/drivers/net/pppoe.c
+@@ -432,12 +432,12 @@ static int pppoe_disc_rcv(struct sk_buff
+       if (dev->nd_net != &init_net)
+               goto abort;
+-      if (!pskb_may_pull(skb, sizeof(struct pppoe_hdr)))
+-              goto abort;
+-
+       if (!(skb = skb_share_check(skb, GFP_ATOMIC)))
+               goto out;
++      if (!pskb_may_pull(skb, sizeof(struct pppoe_hdr)))
++              goto abort;
++
+       ph = pppoe_hdr(skb);
+       if (ph->code != PADT_CODE)
+               goto abort;
diff --git a/queue-2.6.25/0007-raw-Restore-proc-net-raw-correct-behavior.patch b/queue-2.6.25/0007-raw-Restore-proc-net-raw-correct-behavior.patch
new file mode 100644 (file)
index 0000000..f18d3f2
--- /dev/null
@@ -0,0 +1,36 @@
+From 609039b24f41632a5942f8a546a719d2f45009fa Mon Sep 17 00:00:00 2001
+From: Eric Dumazet <dada1@cosmosbay.com>
+Date: Wed, 23 Jul 2008 23:54:35 -0700
+Subject: raw: Restore /proc/net/raw correct behavior
+
+From: Eric Dumazet <dada1@cosmosbay.com>
+
+[ Upstream commit 68be802cd5ad040fe8cfa33ce3031405df2d9117 ]
+
+I just noticed "cat /proc/net/raw" was buggy, missing '\n' separators.
+
+I believe this was introduced by commit 8cd850efa4948d57a2ed836911cfd1ab299e89c6
+([RAW]: Cleanup IPv4 raw_seq_show.)
+
+This trivial patch restores correct behavior, and applies to current
+Linus tree (should also be applied to stable tree as well.)
+
+Signed-off-by: Eric Dumazet <dada1@cosmosbay.com>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
+
+---
+ net/ipv4/raw.c |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/net/ipv4/raw.c
++++ b/net/ipv4/raw.c
+@@ -936,7 +936,7 @@ static void raw_sock_seq_show(struct seq
+             srcp  = inet->num;
+       seq_printf(seq, "%4d: %08X:%04X %08X:%04X"
+-              " %02X %08X:%08X %02X:%08lX %08X %5d %8d %lu %d %p %d",
++              " %02X %08X:%08X %02X:%08lX %08X %5d %8d %lu %d %p %d\n",
+               i, src, srcp, dest, destp, sp->sk_state,
+               atomic_read(&sp->sk_wmem_alloc),
+               atomic_read(&sp->sk_rmem_alloc),
diff --git a/queue-2.6.25/0008-xfrm-fix-fragmentation-for-ipv4-xfrm-tunnel.patch b/queue-2.6.25/0008-xfrm-fix-fragmentation-for-ipv4-xfrm-tunnel.patch
new file mode 100644 (file)
index 0000000..a2ac488
--- /dev/null
@@ -0,0 +1,38 @@
+From fd8af5d2aed74e26cc97bfcd0b8bf2aa0d64c541 Mon Sep 17 00:00:00 2001
+From: Steffen Klassert <steffen.klassert@secunet.com>
+Date: Wed, 23 Jul 2008 23:55:40 -0700
+Subject: xfrm: fix fragmentation for ipv4 xfrm tunnel
+
+From: Steffen Klassert <steffen.klassert@secunet.com>
+
+[ Upstream commit fe833fca2eac6b3d3ad5e35f44ad4638362f1da8 ]
+
+When generating the ip header for the transformed packet we just copy
+the frag_off field of the ip header from the original packet to the ip
+header of the new generated packet. If we receive a packet as a chain
+of fragments, all but the last of the new generated packets have the
+IP_MF flag set. We have to mask the frag_off field to only keep the
+IP_DF flag from the original packet. This got lost with git commit
+36cf9acf93e8561d9faec24849e57688a81eb9c5 ("[IPSEC]: Separate
+inner/outer mode processing on output")
+
+Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
+Acked-by: Herbert Xu <herbert@gondor.apana.org.au>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
+
+---
+ net/ipv4/xfrm4_mode_tunnel.c |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/net/ipv4/xfrm4_mode_tunnel.c
++++ b/net/ipv4/xfrm4_mode_tunnel.c
+@@ -52,7 +52,7 @@ static int xfrm4_mode_tunnel_output(stru
+               IP_ECN_clear(top_iph);
+       top_iph->frag_off = (flags & XFRM_STATE_NOPMTUDISC) ?
+-                          0 : XFRM_MODE_SKB_CB(skb)->frag_off;
++              0 : (XFRM_MODE_SKB_CB(skb)->frag_off & htons(IP_DF));
+       ip_select_ident(top_iph, dst->child, NULL);
+       top_iph->ttl = dst_metric(dst->child, RTAX_HOPLIMIT);
diff --git a/queue-2.6.25/0009-udplite-Protection-against-coverage-value-wrap-arou.patch b/queue-2.6.25/0009-udplite-Protection-against-coverage-value-wrap-arou.patch
new file mode 100644 (file)
index 0000000..6d8967b
--- /dev/null
@@ -0,0 +1,70 @@
+From a8b5e88b499be3bd9c80a27e512ceee960882eee Mon Sep 17 00:00:00 2001
+From: Gerrit Renker <gerrit@erg.abdn.ac.uk>
+Date: Thu, 24 Jul 2008 00:11:56 -0700
+Subject: udplite: Protection against coverage value wrap-around
+
+From: Gerrit Renker <gerrit@erg.abdn.ac.uk>
+
+[ Upstream commit 47112e25da41d9059626033986dc3353e101f815 ]
+
+This patch clamps the cscov setsockopt values to a maximum of 0xFFFF.
+
+Setsockopt values greater than 0xffff can cause an unwanted
+wrap-around.  Further, IPv6 jumbograms are not supported (RFC 3838,
+3.5), so that values greater than 0xffff are not even useful.
+
+Further changes: fixed a typo in the documentation.
+
+[ Add USHORT_MAX from upstream to linux/kernel.h -DaveM ]
+
+Signed-off-by: Gerrit Renker <gerrit@erg.abdn.ac.uk>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
+
+---
+ Documentation/networking/udplite.txt |    2 +-
+ include/linux/kernel.h               |    1 +
+ net/ipv4/udp.c                       |    4 ++++
+ 3 files changed, 6 insertions(+), 1 deletion(-)
+
+--- a/Documentation/networking/udplite.txt
++++ b/Documentation/networking/udplite.txt
+@@ -148,7 +148,7 @@
+         getsockopt(sockfd, SOL_SOCKET, SO_NO_CHECK, &value, ...);
+   is meaningless (as in TCP). Packets with a zero checksum field are
+-  illegal (cf. RFC 3828, sec. 3.1) will be silently discarded.
++  illegal (cf. RFC 3828, sec. 3.1) and will be silently discarded.
+   4) Fragmentation
+--- a/include/linux/kernel.h
++++ b/include/linux/kernel.h
+@@ -20,6 +20,7 @@
+ extern const char linux_banner[];
+ extern const char linux_proc_banner[];
++#define USHORT_MAX    ((u16)(~0U))
+ #define INT_MAX               ((int)(~0U>>1))
+ #define INT_MIN               (-INT_MAX - 1)
+ #define UINT_MAX      (~0U)
+--- a/net/ipv4/udp.c
++++ b/net/ipv4/udp.c
+@@ -1325,6 +1325,8 @@ int udp_lib_setsockopt(struct sock *sk, 
+                       return -ENOPROTOOPT;
+               if (val != 0 && val < 8) /* Illegal coverage: use default (8) */
+                       val = 8;
++              else if (val > USHORT_MAX)
++                      val = USHORT_MAX;
+               up->pcslen = val;
+               up->pcflag |= UDPLITE_SEND_CC;
+               break;
+@@ -1337,6 +1339,8 @@ int udp_lib_setsockopt(struct sock *sk, 
+                       return -ENOPROTOOPT;
+               if (val != 0 && val < 8) /* Avoid silly minimal values.       */
+                       val = 8;
++              else if (val > USHORT_MAX)
++                      val = USHORT_MAX;
+               up->pcrlen = val;
+               up->pcflag |= UDPLITE_RECV_CC;
+               break;
diff --git a/queue-2.6.25/series b/queue-2.6.25/series
new file mode 100644 (file)
index 0000000..07434c8
--- /dev/null
@@ -0,0 +1,9 @@
+0001-hdlcdrv-Fix-CRC-calculation.patch
+0002-ipv6-__KERNEL__-ifdef-struct-ipv6_devconf.patch
+0003-ipv6-use-timer-pending.patch
+0004-l2tp-Fix-potential-memory-corruption-in-pppol2tp_re.patch
+0005-net-pppoe-Check-packet-length-on-all-receive-paths.patch
+0006-pppoe-Unshare-skb-before-anything-else.patch
+0007-raw-Restore-proc-net-raw-correct-behavior.patch
+0008-xfrm-fix-fragmentation-for-ipv4-xfrm-tunnel.patch
+0009-udplite-Protection-against-coverage-value-wrap-arou.patch