summaryrefslogtreecommitdiff
path: root/net/tipc
AgeCommit message (Expand)AuthorFilesLines
2025-12-07tipc: Fix use-after-free in tipc_mon_reinit_self().Kuniyuki Iwashima1-0/+2
2025-10-02minmax: add in_range() macroMatthew Wilcox (Oracle)2-6/+6
2025-07-17tipc: Fix use-after-free in tipc_conn_close().Kuniyuki Iwashima1-0/+2
2025-06-27tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearerHaixia Qu1-2/+2
2025-06-27tipc: use kfree_sensitive() for aead cleanupZilin Guan1-1/+1
2025-06-27net: tipc: fix refcount warning in tipc_aead_encryptCharalampos Mitrodimas1-1/+5
2025-06-04net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_doneWang Liang1-0/+5
2025-05-02tipc: fix NULL pointer dereference in tipc_mon_reinit_self()Tung Nguyen1-1/+2
2025-04-25tipc: fix memory leak in tipc_link_xmitTung Nguyen1-0/+1
2025-02-21tipc: re-order conditions in tipc_crypto_key_rcv()Dan Carpenter1-2/+2
2024-12-19tipc: fix NULL deref in cleanup_bearer()Eric Dumazet1-1/+6
2024-12-14tipc: Fix use-after-free of kernel socket in cleanup_bearer().Kuniyuki Iwashima1-1/+1
2024-12-14sock_diag: add module pointer to "struct sock_diag_handler"Eric Dumazet1-0/+1
2024-10-17tipc: guard against string buffer overrunSimon Horman1-2/+6
2024-10-17net: tipc: avoid possible garbage valueSu Hui1-1/+1
2024-08-03tipc: Return non-zero value from tipc_udp_addr2str() on errorShigeru Yoshida1-1/+4
2024-06-27tipc: force a dst refcount before doing decryptionXin Long1-0/+1
2024-05-17tipc: fix UAF in error pathPaolo Abeni1-1/+5
2024-05-17tipc: fix a possible memleak in tipc_buf_appendXin Long1-1/+1
2024-02-16tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()Shigeru Yoshida1-0/+6
2023-11-28tipc: Fix kernel-infoleak due to uninitialized TLV valueShigeru Yoshida1-0/+1
2023-11-20tipc: Change nla_policy for bearer-related names to NLA_NUL_STRINGShigeru Yoshida1-2/+2
2023-11-20tipc: Use size_add() in calls to struct_size()Gustavo A. R. Silva1-2/+2
2023-10-10tipc: fix a potential deadlock on &tx->lockChengfeng Ye1-2/+2
2023-08-03tipc: stop tipc crypto on failure in tipc_node_createFedor Pchelkin1-1/+1
2023-08-03tipc: check return value of pskb_trim()Yuanjun Gong1-1/+2
2023-06-21net: tipc: resize nlattr array to correct sizeLin Ma1-2/+2
2023-05-24tipc: check the bearer min mtu properly when setting it by netlinkXin Long1-2/+2
2023-05-24tipc: do not update mtu if msg_max is too small in mtu negotiationXin Long1-3/+6
2023-05-24tipc: add tipc_bearer_min_mtu to calculate min mtuXin Long3-2/+19
2023-05-24net: deal with most data-races in sk_wait_event()Eric Dumazet1-2/+2
2023-02-22tipc: fix kernel warning when sending SYN messageTung Nguyen1-0/+2
2023-02-09use less confusing names for iov_iter direction initializersAl Viro1-1/+1
2023-01-18tipc: fix unexpected link reset due to discovery messagesTung Nguyen1-4/+8
2022-12-07tipc: call tipc_lxc_xmit without holding node_read_lockXin Long1-3/+9
2022-12-06tipc: Fix potential OOB in tipc_link_proto_rcv()YueHaibing1-1/+3
2022-11-29tipc: re-fetch skb cb after tipc_msg_validateXin Long1-0/+3
2022-11-22tipc: check skb_linearize() return value in tipc_disc_rcv()YueHaibing1-1/+4
2022-11-22tipc: add an extra conn_get in tipc_conn_allocXin Long1-3/+6
2022-11-22tipc: set con sock in tipc_conn_allocXin Long1-6/+5
2022-11-08tipc: fix the msg->req tlv len check in tipc_nl_compat_name_table_dump_headerXin Long1-1/+1
2022-10-21tipc: fix a null-ptr-deref in tipc_topsrv_acceptXin Long1-4/+12
2022-10-21Merge tag 'net-6.1-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/netd...Linus Torvalds2-2/+2
2022-10-14tipc: fix an information leak in tipc_topsrv_kern_subscrAlexander Potapenko1-1/+1
2022-10-14tipc: Fix recognition of trial periodMark Tomlinson1-1/+1
2022-10-12treewide: use prandom_u32_max() when possible, part 1Jason A. Donenfeld1-1/+1
2022-09-30net/tipc: Remove unused struct distr_queue_itemYuan Can1-8/+0
2022-09-08Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/netPaolo Abeni1-1/+1
2022-09-02tipc: fix shift wrapping bug in map_get()Dan Carpenter1-1/+1
2022-08-29genetlink: start to validate reserved header bytesJakub Kicinski2-0/+2