angler: update prebuilt kernel

be78331 net: wireless: bcmdhd: fix buffer overrun in private command path
3b92ea0 Merge branch 'android-msm-angler-3.10-nyc-mr2' into android-msm-angler-3.10
cbf66a6 net: wireless: bcmdhd: fix buffer overrun in private command path
9db2853 Merge branch 'android-msm-angler-3.10-nyc' into android-msm-angler-3.10-nyc-mr1
a920c6a msm: kgsl: fix sync file error handling
900b8b7 input: ldaf: Initialize buffers before use.
8913eef UPSTREAM: ring-buffer: Prevent overflow of size in ring_buffer_resize()
6b6cfb2 perf: don't leave group_entry on sibling list (use-after-free)
78506ab msm: ispif: Remove handling of SD_SHUTDOWN
d567c74 input: synaptics_dsx: add update bounds checks.
600c59f ALSA: info: Check for integer overflow in snd_info_entry_write()
e5c1b00 net: wireless: bcmdhd: fix buffer overrun in anqpo config
068427b net: wireless: bcmdhd: Security V: memory overflow in wifi driver function __dhd_apf_add_filter
84d142e BACKPORT: mm: avoid setting up anonymous pages into file mapping
d6c4383 msm: sensor: Adding mutex for actuator power down operations
67d429b net: wireless: bcmdhd: Heap over write in dhdmsgbuf_query_ioctl
8f1621c net: wireless: bcmdhd: fix buffer overrun in wl_cfgvendor_hotlist_cfg
c2f9a39 net: wireless: bcmdhd: Fix up the BRCM wifi DHD code
39bd1fc net: wireless: bcmdhd: fix overrun in dhd_pno_set_cfg_gscan
0ee1994 net: wireless: bcmdhd: fix buffer overrun in private command path
5205c3a ASoC: msm: set pointers to NULL after kfree
ebb5537 arm64/configs: angler: enable CONFIG_QUOTA
3781db1 UPSTREAM: procfs: fixes pthread cross-thread naming if !PR_DUMPABLE
20a5411 ion: Fix use after free during ION_IOC_ALLOC
410485b Merge branch android-msm-angler-3.10-nyc-security-next into android-msm-angler-3.10-nyc
8e439ec UPSTREAM: mm: remove gup_flags FOLL_WRITE games from __get_user_pages()
6b3a010 Revert "Add field to fuse_open_out"
5621e34 net: ping: Fix stack buffer overflow in ping_common_sendmsg()
9f5af92 binder: blacklist %p kptr_restrict
980fd79 UPSTREAM: KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring
9224261 input: synaptics_dsx: allocate heap memory for temp buf
36fb08d UPSTREAM: KEYS: Fix race between key destruction and finding a keyring by name
fd6556a qdsp6v2: blacklist %p kptr_restrict
a4c681c msm: mdss: blacklist %p kptr_restrict
44a8e52 ion: blacklist %p kptr_restrict
65bfecf ASoC: msm: lock read/write when add/free audio ion memory
92053b6 BACKPORT: perf: Fix event->ctx locking
c183e2f perf: protect group_leader from races that cause ctx double-free
fd11eb5 input: synaptics_dsx: add bounds checks for firmware id
e0954cf netfilter: Change %p to %pK in debug messages
9e5ab41 usb: gadget: f_mbim: Change %p to %pK in debug messages
457ae6e drivers: video: Add bounds checking in fb_cmap_to_user
45ffb55 ASoC: check for null function pointer for dummy device read/write, take 2
609617a UPSTREAM: staging/android/ion : fix a race condition in the ion driver
b7541e6 msm: sensor: validate the i2c table index before use
d631287 UPSTREAM: arm64: make sys_call_table const
55fd801 ARM: make sure RO local relocations are part of kernel RO section
b626b42 BACKPORT: msm: camera: Avoid exposing kernel addresses
a4cbf86 BACKPORT: msm: camera: cpp: Add validation for v4l2 ioctl arguments
f854302 Add field to fuse_open_out
38c3e2f Fast-forward branch android-msm-angler-3.10-nyc into android-msm-angler-3.10-nyc-security-next
1905501 input: touchscreen: synaptics: prevent sysfs races
8667cc5 input: synaptics: defer sysfs creation during init
a2a8a69 msm: crypto: Fix integer over flow check in qcrypto driver
e859585 UPSTREAM: perf: Fix race in swevent hash
ec446ea msm: vidc: use %pK instead of %p which respects kptr_restrict sysctl.
2554c95 msm: kgsl: Change %p to %pK in debug messages
7fab4d4 arm64/configs: angler: disable extra SCSI configs
bd53070 soc: qcom: smp2p: Fix kernel address leak
6f41fe7 msm: msm_bus: fix stack overflow bug
6d83552 UPSTREAM: proc: prevent accessing /proc/<PID>/environ until it's ready
fc9fa1a misc: qcom: qdsp6v2: initialize wma_config_32
d683077 msm: camera: cpp: Validate frame message before manipulating it.
c2aea39 ASoC: msm: Add Buffer overflow check
b4bd543 Revert "Asoc:msm:Added Buffer overflow check"
2f773fc UPSTREAM: af_unix: Guard against other == sk in unix_dgram_sendmsg
1171ff7 misc: qcom: qdsp6v2: initialize config_32
365f0e4 cgroup: prefer %pK to %p
6d28125 UPSTREAM: block: fix use-after-free in seq file
4e632a6 msm: camera: Restructure data handling to be more robust
bcfbaf7 msm: sensor: Avoid potential stack overflow
931bd14 qcedev: Validate Source and Destination addresses
6d90767 ion: Disable ION_HEAP_TYPE_SYSTEM_CONTIG
4a70c24 msm-core: debug: Update the number of supported pstates.
c459ad9 ASoC: msm: initialize the params array before using it
b4ed077 arm64/configs: angler: remove tuner support
04dd6df UPSTREAM: [media] xc2028: unlock on error in xc2028_set_config()
1154929 qseecom: Change format specifier %p to %pK
c8d9540 UPSTREAM: HID: core: prevent out-of-bound readings
6ff2019 BACKPORT: ALSA: usb-audio: Fix double-free in error paths after snd_usb_add_audio_stream() call
9f14525 BACKPORT: ALSA: usb-audio: Minor code cleanup in create_fixed_stream_quirk()
fe96e69 BACKPORT: tty: Prevent ldisc drivers from re-using stale tty fields
04bc719 UPSTREAM: [media] xc2028: avoid use after free
533004c UPSTREAM: tcp: fix use after free in tcp_xmit_retransmit_queue()
6e3739a BACKPORT: block: fix use-after-free in sys_ioprio_get()
875b816 ANDROID: binder: Clear binder and cookie when setting handle in flat binder struct
5e2a2bc ANDROID: binder: Add strong ref checks
9930e89 qseecom: validate the inputs of __qseecom_send_modfd_resp
f42dfa0 msm: mdss: Correct block id check for mdss_mdp_misr_table
3ee3b17 msm: crypto: Fix integer overflow check in qcedev driver
eddadac msm: camera: sensor: Fix use after free condition
f3361a2 msm: camera: restructure data handling to be more robust
2956643 input: synaptics: allocate heap memory for temp buf
d15c626 arm64: dma-mapping: always clear allocated buffers
d9ae1b1 BACKPORT: Bluetooth: Fix potential NULL dereference in RFCOMM bind callback
2377d36 UPSTREAM: arm64: perf: reject groups spanning multiple HW PMUs
98480c1 binder: prevent kptr leak by using %pK format specifier
6308e9a msm: ADSPRPC: Do not access user memory directly
aab1738 ASoC: msm8994: Replace %p with %pK
e147412 ASoC: msm-lsm-client: free lsm client data in msm_lsm_close
100501b BACKPORT: tcp: make challenge acks less predictable
14ba73c UPSTREAM: net: Fix use after free in the recvmmsg exit path
eac62a9 ASoC: msm: qdsp6v2: Add size check in audio cal ioctl
a764748 msm: mdss: Fix to validate data copied from user space
23bc42a ASoC: check for null function pointer for dummy device read/write
605694f msm: ipa: handle information leak on ADD_FLT_RULE_INDEX ioctl
40a713f misc: qcom: qdsp6v2: Add missing initialization
dd31604 staging: android: Change %p to %pK in debug messages
de1f200 net: ipc_router: Bind only a client port as control port
55a5cbc ashmem: Validate ashmem memory with fops pointer
8cdac91 fs: ext4: disable support for fallocate FALLOC_FL_PUNCH_HOLE
6ce1638 msm: ipa: fix potential race condition ioctls
00c0041 msm: camera: Fix memory read by adding bounds check
8b27587 BACKPORT: netfilter: x_tables: validate e->target_offset early
87a45ab UPSTREAM: netfilter: x_tables: make sure e->next_offset covers remaining blob size
d74b9cf BACKPORT: cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind
dd8d18b UPSTREAM: ASoC: wcd9xxx: Fix unprotected userspace access
aa7870c BACKPORT: KEYS: potential uninitialized variable
4e660da UPSTREAM: ipv6: Don't reduce hop limit for an interface
a973789 UPSTREAM: udp: fix behavior of wrong checksums
9199349 UPSTREAM: ppp: take reference on channels netns
07a8da2 UPSTREAM: netfilter: x_tables: fix unconditional helper
975fb28 qcom: ssr: Fix possible overflow when copying firmware name
1496999 msm-core: debug: Fix the number of arguments for sysfs nodes

Linux version 3.10.73-gbe78331 (android-build@wpix12.hot.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
 #1 SMP PREEMPT Thu Nov 17 20:36:34 UTC 2016 (master)

Bug: 27045580
Bug: 28032718
Bug: 28675151
Bug: 28744625
Bug: 28751152
Bug: 28760453
Bug: 28799389
Bug: 28815326
Bug: 28838221
Bug: 28919863
Bug: 28940694
Bug: 28967028
Bug: 28979703
Bug: 29000183
Bug: 29119002
Bug: 29156684
Bug: 29157595
Bug: 29323142
Bug: 29409847
Bug: 29464815
Bug: 29507402
Bug: 29508816
Bug: 29512527
Bug: 29513227
Bug: 29637687
Bug: 29795245
Bug: 29823941
Bug: 29953313
Bug: 29999665
Bug: 30019716
Bug: 30034511
Bug: 30067360
Bug: 30074605
Bug: 30076504
Bug: 30102557
Bug: 30141991
Bug: 30142668
Bug: 30143283
Bug: 30143904
Bug: 30148242
Bug: 30148243
Bug: 30149174
Bug: 30149612
Bug: 30152182
Bug: 30222859
Bug: 30228438
Bug: 30311977
Bug: 30312054
Bug: 30400942
Bug: 30402628
Bug: 30445380
Bug: 30445973
Bug: 30515053
Bug: 30515201
Bug: 30559423
Bug: 30593266
Bug: 30652312
Bug: 30740545
Bug: 30741851
Bug: 30768347
Bug: 30809774
Bug: 30874196
Bug: 30902162
Bug: 30942273
Bug: 30946097
Bug: 30946378
Bug: 30951112
Bug: 30951261
Bug: 30951599
Bug: 30951939
Bug: 30952077
Bug: 30952477
Bug: 30955111
Bug: 31095224
Bug: 31183296
Bug: 31225246
Bug: 31243641
Bug: 31252384
Bug: 31252388
Bug: 31253168
Bug: 31349935
Bug: 31494725
Bug: 31495231
Bug: 31498159
Bug: 31498403
Bug: 31525965
Bug: 31568617
Bug: 31651010
Bug: 31660652
Bug: 31703084
Bug: 31795790
Bug: 31796940
Bug: 31799972
Bug: 31802656
Bug: 31822524
Bug: 31911920
Bug: 31968442
Bug: 32125137
Bug: 32141528
Bug: 32174590
Bug: 32219121
Bug: 32219255
Bug: 32219453
Bug: 32402548
Bug: 32450563
Bug: 32460277
Bug: 32474971
Bug: 32510733
Bug: 32659848
Change-Id: I8b46c96bca8a5b5816ea8f51ea3eb75fa984558e
Source-Branch: android-msm-angler-3.10
Signed-off-by: Patrick Tjin <pattjin@google.com>
1 file changed
tree: 09deb7c4ddf2a54fbbd5c199d9d9bda4d4d9bc75
  1. Image.gz-dtb
  2. Image_treble.gz-dtb