bullhead: update prebuilt kernel [ DO NOT MERGE ]

1b227bb1 ANDROID: ion: Protect kref from userspace manipulation
4989793c ASoC: msm: qdsp6v2: Fix out-of-bounds access in put functions
175e490f FROMLIST: msm: mdss: Correct the format specifiers in sscanf function
4b50125d FROMLIST: msm: ipa: fix ioctl input param validation
4ec51772 mdss: Validate cursor image size
825b236b FROMLIST: defconfig: msm: Disable CONFIG_CP_ACCESS64
47918a43 qcacld-2.0: Do not copy buffer to user-space if diag read fails
a1363cb4 qcacld-2.0: Fix buffer overflow in WLANSAP_Set_WPARSNIes()
f9a04380 FROMLIST: 9p: fix a potential acl leak
7f22e818 BACKPORT: posix_acl: Clear SGID bit when setting file permissions
ddc398c5 qcacld-2.0: Avoid integer overflow in wma_enable_arp_ns_offload
d583f12e sdcardfs: limit stacking depth
de04c177 BACKPORT: fs: limit filesystem stacking depth
f6432eda UPSTREAM: udp: properly support MSG_PEEK with truncated buffers
a33fab25 FROMLIST: ASoC: msm: qdspv2: add mutex lock when access output buffer length
4c71366d crypto: msm: check integer overflow on total data len in qcedev.c
be081a35 FROMLIST: qcrypto: protect potential integer overflow.

Linux version 3.10.73-g1b227bb (android-build@vpea11.mtv.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
 #1 SMP PREEMPT Wed Feb 15 17:19:28 PST 2017 ( nyc-mr1 )

Bug: 32068683
Bug: 32074353
Bug: 32086742
Bug: 32458736
Bug: 32658595
Bug: 32761463
Bug: 32813456
Bug: 33353700
Bug: 33544431
Bug: 33649808
Bug: 34125463
Bug: 34276203
Bug: 34386696
Bug: 34389927
Bug: 34390017
Change-Id: Id1b7e8ed85b07732e686eddd1ecb5417951d77e4
Source-Branch: android-msm-bullhead-3.10-nyc-mr1
Signed-off-by: John Dias <joaodias@google.com>
(cherry picked from commit 4f0c393aa85f1fbebb21c2a38a14b669f57655fc)
1 file changed
tree: 4cb62663d43b97ff4ed34d78f3629e3fac322dd2
  1. Image.gz-dtb