Age | Commit message (Collapse) | Author |
|
4186580, 4195442, 4195443, 4186193, 4186194, 4186195, 4186196, 4186607, 4195444, 4195297, 4186608, 4186609, 4186610, 4186611, 4186612, 4186613, 4186614, 4186649, 4186650, 4186651, 4186652, 4186653, 4186654, 4186655, 4186656, 4186657, 4195518, 4195519, 4195520, 4195521, 4195522, 4186406, 4186407, 4186408, 4195523, 4195558, 4195559, 4186197, 4195524, 4186615, 4195445, 4195446, 4186829, 4186830, 4186831, 4186832, 4186833, 4186834, 4186835, 4186836, 4186837, 4195578, 4195579, 4195580, 4195581, 4195447, 4186581, 4195448, 4195560] into sparse-4749909-L06000000176800346
Change-Id: I5d3e28434af31b124206743475b218ba05633d52
|
|
5a2a297d Merge branch 'android-msm-angler-3.10-security-next' into android-msm-angler-3.10
10d9656e Merge branch 'android-msm-angler-3.10' into android-msm-angler-3.10-security-next
1df48bf3 BACKPORT: futex: Prevent overflow by strengthen input validation
d204fea6 Revert "BACKPORT: futex: Prevent overflow by strengthen input validation"
4ba2a83c soc: q6dspv2: apr: fix client registration refcount
588a8e09 msm: sensor: ois: add conditional check for ioctl
3b417d4e msm: adsprpc: Use unsigned integer for length values
b033ddd9 udp: consistently apply ufo or fragmentation
5b7d39ae drivers: cpuidle: lpm-levels: Fix untrusted pointer dereference.
e7a91b52 BACKPORT: futex: Remove requirement for lock_page() in get_futex_key()
40d05cf8 BACKPORT: futex: Prevent overflow by strengthen input validation
c0a79c43 ASoC: msm: qdsp6v2: check for buffer size before read
b5db04de msm: mdss: fix race condition between rotator api's
ab8bb700 UPSTREAM: scsi: sg: don't return bogus Sg_requests
Linux version 3.10.73-g5a2a297 (android-build@abfarm111) (gcc version
4.9.x-google 20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Thu May
10 21:27:35 UTC 2018
Bug: 34088848
Bug: 38258851
Bug: 63165135
Bug: 68806309
Bug: 72956998
Bug: 74250718
Bug: 75300370
Bug: 76106267
Bug: 77527701
Bug: 77528653
Bug: 79090045
Bug: 79366047
Change-Id: I5445b90ef4adcbb5351fd23d5e6e3513d3bfc373
Source-Branch: android-msm-angler-3.10
Signed-off-by: Badhri Jagan Sridharan <badhri@google.com>
(cherry picked from commit 64f33b1dabb8cd86042b20b3a380109e8fa61a18)
|
|
56d0150e Revert "ion: ensure CMO target is valid"
1265eb6d Merge branch 'android-msm-angler-3.10-security-next' into android-msm-angler-3.10
d646d155 msm: ADSPRPC: Use ID in response to get context pointer
286c3cc7 BACKPORT: ASN.1: fix out-of-bounds read when parsing indefinite length item
a6bc0c79 UPSTREAM: KEYS: fix out-of-bounds read during ASN.1 parsing
1f19ec80 ion: ensure CMO target is valid
339608f3 crypto: hmac - require that the underlying hash algorithm is unkeyed
1c5eb178 diag: dci: check signed values for negativity
a76a2c7d diag: Add conditional check for len in dci_process_ctrl_status()
f6d21470 mm-camera2:isp2: Handle use after free buffer
f729317a ANDROID: Bluetooth: hidp: buffer overflow in hidp_process_report
80f7db71 UPSTREAM: HID: Bluetooth: hidp: make sure input buffers are big enough
01ad7056 BACKPORT: ipv6: fix udpv6 sendmsg crash caused by too small MTU
0c4e9c9c UPSTREAM: ipv4, ipv6: ensure raw socket message is big enough to hold an IP header
67266758 ASoC: wcd_cpe_core: Add mutex lock for CPE session
a645b3eb msm: ADSPRPC: use access_ok to validate pointers
Linux version 3.10.73-g56d0150e64b (android-
build@xpce6.ams.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Tue May 8 17:20:42
UTC 2018
Bug: 62536960
Bug: 63165064
Bug: 65023306
Bug: 65853588
Bug: 69065862
Bug: 70528036
Bug: 71752561
Bug: 72957321
Bug: 73827422
Bug: 74237782
Bug: 76444978
Bug: 79219092
Change-Id: I9515482f99d7bbdb3f93c0d9544e6c58260b9ecd
Source-Branch: android-msm-angler-3.10
Signed-off-by: Daniel Mentz <danielmentz@google.com>
(cherry picked from commit 01ac63825c3b4c1dc42138b22e07e00b0b947de3)
|
|
3898959, 3898960, 3897790, 3898312, 3898313, 3898314, 3899155, 3899156, 3899157, 3898289, 3898290, 3899061, 3898291, 3898292, 3896951, 3899158, 3898961, 3898938, 3898246] into sparse-4657601-L30800000163316240
Change-Id: I24d56fdf87276ca57305fb45118a7fd86d2495c5
|
|
7bf03106 Merge branch 'android-msm-angler-3.10-security-next' into android-msm-angler-3.10
7b15a210 drivers: qdsp6v2: Add mutex unlock to properly release lock
9692bf27 msm: msm_bus: Add mutex lock for floor vote data
d3663bf7 UPSTREAM: loop: fix concurrent lo_open/lo_release
715cd7b5 msm: mdss: adjust mdss_mdp_get_plane_sizes parameters init order
f2a70df0 Input: gtco - fix potential out-of-bound access
b1a5cc49 msm: sensor: actuator: fix out of bound read for region params
bc456a59 msm: sensor: actuator: add null pointer check for i2c array
93868996 msm: camera: sensor: Validate destination step position
4d61c334 msm: sensor: actuator: check NULL pointer for actuator ctrl
f16dc7ad msm: sensor: actuator: avoid accessing out of bound memory
e8799a16 Merge branch 'android-msm-angler-3.10' into android-msm-angler-3.10-security-next
Linux version 3.10.73-g7bf0310 (android-build@abfarm245) (gcc version
4.9.x-google 20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Thu Mar
15 22:25:39 UTC 2018
Bug: 65122765
Bug: 69916367
Bug: 71501679
Bug: 72867809
Bug: 72956941
Bug: 72957040
Bug: 74402703
Test: Built and flashed boot.img. Device booted up successfully.
Change-Id: I0543ddfaab6aa319890f1400e3814f7b7cd318c5
Source-Branch: android-msm-angler-3.10
Signed-off-by: Siyuan Zhou <siyuanzhou@google.com>
(cherry picked from commit c8608fc8adefb3c811e5ec9baeccdbe27ea069b3)
|
|
3478654, 3478655, 3478656, 3479494, 3479495, 3478933, 3478934, 3479496, 3479497, 3479498, 3478160, 3478161, 3478162, 3478876, 3478877, 3478878, 3478241, 3478163, 3478164, 3478165, 3478166, 3478167, 3478168, 3478169, 3479990, 3479991, 3479992, 3480010, 3480011, 3480012] into oc-m2-release
Change-Id: I1fb33b587e26983407c3254c70e71e633cd56266
|
|
angler: update kernel prebuilt
9142a68b Merge branch 'android-msm-angler-3.10-security-next' into android-msm-angler-3.10
1a3a7631 msm:ipa: Fix to incorrect structure access
04bd7c00 msm: sensor: flash: add conditional check for ioctl
0bdec1f3 ASoC: msm: qdsp6v2: Set freed pointers to NULL
b74dcd1c UPSTREAM: packet: fix tp_reserve race in packet_set_ring
492e4ed4 diag: Add protection while de-initializing clients
25c948ed UPSTREAM: USB: serial: console: fix use-after-free after failed setup
5a9a76f1 UPSTREAM: ALSA: usb-audio: Kill stray URB at exiting
b20cb75b UPSTREAM: ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor
7b8e29ae UPSTREAM: USB: fix out-of-bounds in usb_set_configuration
403b1758 UPSTREAM: HID: usbhid: fix out-of-bounds bug
6f694601 UPSTREAM: USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()
1310cdd9 UPSTREAM: packet: hold bind lock when rebinding to fanout hook
8d58bb26 BACKPORT: packet: in packet_do_bind, test fanout with bind_lock held
d07ca335 power: qcom: msm-core: Add mutex lock for ioctl
2c32d7ab FROMLIST: power: Fix user ptr in EA_LEAKAGE ioctl
3559400b diag: Add mutex protection while reading dci debug statistics
41cf64bd ANDROID: sdcardfs: Add default_normal option
6f661860 ANDROID: sdcardfs: notify lower file of opens
d7193540 ANDROID: sound: rawmidi: Hold lock around realloc
bfa67ef4 rtac: add size check when reading cal data kvaddr buffer
a6661da5 ANDROID: qtaguid: Fix the UAF probelm with tag_ref_tree
4d87c6eb msm: camera: Return -NOTTY on invalid ioctl command.
d9bbbff0 BACKPORT: ALSA: seq: Fix use-after-free at creating a port
d2579ab4 msm: ipa: Fix to use after free issue
da5730bc FROMLIST: input: synaptics_dsx: remove unused synaptics touch screen driver files
5071f5a0 iovec: make sure the caller actually wants anything in memcpy_fromiovecend
1f537533 Merge branch 'android-msm-angler-3.10' into android-msm-angler-3.10-security-next
5a720136 Merge branch 'android-msm-angler-3.10-oc' into android-msm-angler-3.10
78384f0f clocksource: arch_timer: make virtual counter access configurable
0ceec3c9 arm64: issue isb when trapping CNTVCT_EL0 access
b789fddc BACKPORT: arm64: Add CNTFRQ_EL0 trap handler
ce1c246a BACKPORT: arm64: Add CNTVCT_EL0 trap handler
3914a619 UPSTREAM: crypto: algif_skcipher - Load TX SG list after waiting
4d4884ce arm64/configs: angler: remove unused configs for Bluetooth
04d52620 msm: ADSPRPC: validate user buffers after copying from user
a2887cdc input: synaptics: restrict sysfs node write permissions
569a5620 BACKPORT: Sanitize 'move_pages()' permission checks
040986ce staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl
28d13c64 ASoC: wcd9xxx: restrict debugfs permission
17c719aa soc: qcom: glink_pkt: fix spinlock patch
7e2aa5f9 soc: qcom: glink_pkt: Use spinlock to protect Rx data packet list
982ff161 Merge branch 'android-msm-angler-3.10' into android-msm-angler-3.10-security-next
4b55f655 Merge branch 'android-msm-angler-3.10' into android-msm-angler-3.10-security-next
7392b108 Merge branch 'android-msm-angler-3.10' into android-msm-angler-3.10-security-next
8937d7f6 Merge branch 'android-msm-angler-3.10' into android-msm-angler-3.10-security-next
2eeb37d0 Merge android-msm-angler-3.10 into android-msm-angler-3.10-security-next
e7863dfe Merge android-msm-angler-3.10 into android-msm-angler-3.10-security-next
f90d1634 UPSTREAM: char: Drop bogus dependency of DEVPORT on !M68K
2a445d6e FROMLIST: msm: qdsp6v2: set pointer to NULL after free
86f48f86 Merge branch msm-huawei/android-msm-angler-3.10 into android-msm-angler-3.10-security-next
6578e586 net: wireless: bcmdhd: fix for IOVAR GET failed
0e89b7b1 xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window
Linux version 3.10.73-g9142a68b659 (android-
build@wprh4.hot.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Fri Jan 12 23:03:37
UTC 2018
Bug: 36000515
Bug: 36279469
Bug: 36565222
Bug: 36604779
Bug: 37158466
Bug: 37210310
Bug: 37275839
Bug: 38177011
Bug: 62464339
Bug: 62800865
Bug: 63174519
Bug: 63527053
Bug: 63851638
Bug: 64315347
Bug: 64386293
Bug: 64672411
Bug: 64836865
Bug: 65172622
Bug: 65468230
Bug: 65853158
Bug: 66954097
Bug: 67713083
Bug: 67713091
Bug: 67713103
Bug: 67900971
Bug: 68266545
Bug: 68664502
Bug: 68806121
Bug: 68870904
Bug: 68992478
Bug: 68992479
Bug: 68996174
Bug: 69050921
Bug: 69051382
Bug: 69051731
Bug: 69052055
Bug: 69052348
Bug: 69052675
Bug: 69160446
Bug: 70235107
Bug: 70237702
Bug: 70237704
Bug: 70706497
Change-Id: Ic069a0b2da53b999cb99152803b40e04b4cb379c
Source-Branch: android-msm-angler-3.10
Signed-off-by: Wei Wang <wvw@google.com>
(cherry picked from commit 6d498382e0adbb95e725635d29c4744d6dfa4605)
|
|
into oc-m2-release
Change-Id: I4e02bf54ea55cc9351ad22d1b652f67c63532a2a
|
|
d7193540482d ANDROID: sound: rawmidi: Hold lock around realloc
bfa67ef470ed rtac: add size check when reading cal data kvaddr buffer
a6661da56dc6 ANDROID: qtaguid: Fix the UAF probelm with tag_ref_tree
4d87c6ebc4e8 msm: camera: Return -NOTTY on invalid ioctl command.
d9bbbff01114 BACKPORT: ALSA: seq: Fix use-after-free at creating a port
d2579ab4c107 msm: ipa: Fix to use after free issue
da5730bcf5c6 FROMLIST: input: synaptics_dsx: remove unused synaptics touch screen driver files
5071f5a022f3 iovec: make sure the caller actually wants anything in memcpy_fromiovecend
1f537533b003 Merge branch 'android-msm-angler-3.10' into android-msm-angler-3.10-security-next
5a720136d4aa Merge branch 'android-msm-angler-3.10-oc' into android-msm-angler-3.10
78384f0f797e clocksource: arch_timer: make virtual counter access configurable
0ceec3c93a57 arm64: issue isb when trapping CNTVCT_EL0 access
b789fddc92f3 BACKPORT: arm64: Add CNTFRQ_EL0 trap handler
ce1c246ac2e7 BACKPORT: arm64: Add CNTVCT_EL0 trap handler
3914a61956b4 UPSTREAM: crypto: algif_skcipher - Load TX SG list after waiting
4d4884ceab60 arm64/configs: angler: remove unused configs for Bluetooth
04d52620b0c3 msm: ADSPRPC: validate user buffers after copying from user
a2887cdcac5c input: synaptics: restrict sysfs node write permissions
569a56200c1a BACKPORT: Sanitize 'move_pages()' permission checks
040986cea60f staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl
28d13c64ee87 ASoC: wcd9xxx: restrict debugfs permission
17c719aad109 soc: qcom: glink_pkt: fix spinlock patch
7e2aa5f94717 soc: qcom: glink_pkt: Use spinlock to protect Rx data packet list
982ff1617f5f Merge branch 'android-msm-angler-3.10' into android-msm-angler-3.10-security-next
4b55f6552068 Merge branch 'android-msm-angler-3.10' into android-msm-angler-3.10-security-next
7392b108c064 Merge branch 'android-msm-angler-3.10' into android-msm-angler-3.10-security-next
8937d7f62a98 Merge branch 'android-msm-angler-3.10' into android-msm-angler-3.10-security-next
2eeb37d04369 Merge android-msm-angler-3.10 into android-msm-angler-3.10-security-next
e7863dfe7bf5 Merge android-msm-angler-3.10 into android-msm-angler-3.10-security-next
f90d1634fb0a UPSTREAM: char: Drop bogus dependency of DEVPORT on !M68K
2a445d6eaf86 FROMLIST: msm: qdsp6v2: set pointer to NULL after free
86f48f86e9b8 Merge branch msm-huawei/android-msm-angler-3.10 into android-msm-angler-3.10-security-next
6578e5863f36 net: wireless: bcmdhd: fix for IOVAR GET failed
0e89b7b1b8b2 xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window
Linux version 3.10.73-gd7193540482 (android-
build@wpra2.hot.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Wed Dec 6 22:19:12
UTC 2017
Bug: 36000515
Bug: 36279469
Bug: 36565222
Bug: 36604779
Bug: 37158466
Bug: 37210310
Bug: 37275839
Bug: 38177011
Bug: 62464339
Bug: 62800865
Bug: 63174519
Bug: 63527053
Bug: 64315347
Bug: 64386293
Bug: 65172622
Bug: 65468230
Bug: 65853158
Bug: 66954097
Bug: 67713083
Bug: 67713091
Bug: 67713103
Bug: 67900971
Bug: 68266545
Bug: 68992478
Bug: 68992479
Bug: 68996174
Bug: 70285905
Change-Id: I6a15bed942212d342533b95542a9dde9a8ddaec3
Source-Branch: android-msm-angler-3.10
Signed-off-by: Thierry Strudel <tstrudel@google.com>
(cherry picked from commit cdee9caac54b16217cd70cd2be78085bcdafa992)
|
|
Change-Id: Ie4839c6abc7233c5d8ff34f3857633032b13a694
|
|
3278010, 3277767, 3277768, 3277769, 3277770, 3276509, 3276510, 3278011, 3278012, 3278013, 3278014, 3278099, 3278100, 3278101, 3278102, 3278103, 3278104, 3278105, 3278106, 3277800, 3276474, 3278015, 3278016, 3278017, 3278118, 3278119, 3278120, 3278121, 3278122, 3277946, 3277905, 3277947, 3277906, 3277751, 3278123, 3277752, 3278110, 3277771, 3277907, 3278095, 3277908, 3278111, 3277772, 3276475, 3276476] into oc-mr1-release
Change-Id: Ie6778bc036c8dfaf2ad9ac44b963b67520956fde
|
|
5a720136 Merge branch 'android-msm-angler-3.10-oc' into android-msm-angler-3.10
78384f0f clocksource: arch_timer: make virtual counter access configurable
0ceec3c9 arm64: issue isb when trapping CNTVCT_EL0 access
b789fddc BACKPORT: arm64: Add CNTFRQ_EL0 trap handler
ce1c246a BACKPORT: arm64: Add CNTVCT_EL0 trap handler
3914a619 UPSTREAM: crypto: algif_skcipher - Load TX SG list after waiting
4d4884ce arm64/configs: angler: remove unused configs for Bluetooth
04d52620 msm: ADSPRPC: validate user buffers after copying from user
a2887cdc input: synaptics: restrict sysfs node write permissions
569a5620 BACKPORT: Sanitize 'move_pages()' permission checks
040986ce staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl
28d13c64 ASoC: wcd9xxx: restrict debugfs permission
17c719aa soc: qcom: glink_pkt: fix spinlock patch
7e2aa5f9 soc: qcom: glink_pkt: Use spinlock to protect Rx data packet list
Linux version 3.10.73-g5a720136d4a (android-
build@wphm9.hot.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Tue Nov 7 22:16:34
UTC 2017
Bug: 62464339
Bug: 62800865
Bug: 63527053
Bug: 64386293
Bug: 65468230
Bug: 66954097
Bug: 67713083
Bug: 67713091
Bug: 68266545
Bug: 68996174
Change-Id: Id312043d768e45dd19a9a3dfe9b156b7f6ade1dd
Source-Branch: android-msm-angler-3.10
Signed-off-by: Patrick Tjin <pattjin@google.com>
(cherry picked from commit 048bb363cce661f20f901193114bab0df190a69d)
|
|
Change-Id: I6e035c809c3fb47ed0cd552311100add2898aed8
|
|
Change-Id: Ib7f0667aeb02c8d60e8749b687991264b7138455
|
|
am: b509be51ef -s ours
Change-Id: I1b5190a88565415c06e5fc137573a14d529958d6
|
|
am: e6d23dce9d -s ours
Change-Id: I641b20a464fe953e376fdd0ad0452a09333a1275
|
|
Change-Id: I817428d5f5089f197f846c3d479ea1eb8df87604
|
|
33ace82f Merge branch 'android-msm-angler-3.10-oc' into android-msm-angler-3.10
e40328e1 Merge branch 'android-msm-angler-3.10-oc-security-next' into android-msm-angler-3.10-oc
2970ea4d msm: gud: Remove gud driver
5bc4ce2d qseecom: Fix accessing userspace memory in kernel space
3e28042f ANDROID: scsi: Add segment checking in sg_read
01517e20 msm: camera: Make use of mutex lock to avoid race condition
853d7b9c ASoC: msm: qdsp6v2: clear address on error
9a4c1e0b coresight: tmc: Fix the unbalanced lock in tmc_read()
f169d05a coresight: tmc: Fix use after free issue with tmc read
3c968bdc fbdev: msm: Allocate fd with O_CLOEXEC flag
7e173b87 msm: mdss: validate page id before reading from edid buffer
3a2e3ad0 msm: ipa: Add mutext protection when updating notify req cache
0a420e78 BACKPORT: dentry name snapshots
e508bde8 angler: remove 'reboot edl' interface for security.
4610f465 msm: sensor: Add mutex lock during ois power down operations
dbef9f3d diag: Fix for possible dci stale entries
6ccf834f diag: dci: Add protection while querying event status
f2950995 diag: dci: Add mutex protection while accessing client details
ed4971fe diag: dci: Add protection while de-initializing clients
aa469e2b ANDROID: usb: gadget: f_mtp: Return error if count is negative
0ee2dead UPSTREAM: ALSA: timer: Call notifier in the same spinlock
7624de59 UPSTREAM: ALSA: timer: Fix race between stop and interrupt
6f0ad078 UPSTREAM: ALSA: timer: Fix link corruption due to double start or stop
7788324e UPSTREAM: ALSA: timer: Code cleanup
ecc778d1 BACKPORT: ALSA: timer: Fix race at concurrent reads
c1e018be BACKPORT: ALSA: timer: Handle disconnection more safely
64c4227a UPSTREAM: ALSA: timer: Fix wrong instance passed to slave callbacks
60ad62eb UPSTREAM: ALSA: timer: Harden slave timer list handling
4e61984d UPSTREAM: ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT
21e752fc BACKPORT: ALSA: timer: Fix race between read and ioctl
d1fa005f msm: vidc: Squash the below changes
58bdb3fa v4l2: Refactor, fix security bug in compat ioctl32
cc0f3058 msm: camera: Avoid deadlock for vb2 operations using separate lock
adfa0c9a ANDROID: ion: Fix uninitialized variable
4c7961ac Bluetooth: cmtp: cmtp_add_connection() should verify that it's dealing with l2cap socket
6442d6bf Bluetooth: bnep: bnep_add_connection() should verify that it's dealing with l2cap socket
6ba11925 ANDROID: usb: gadget: f_mtp: Return error if count is negative
30a02c52 Merge branch 'android-msm-angler-3.10-oc' into android-msm-angler-3.10-oc-security-next
cbd5a934 Merge branch 'android-msm-angler-3.10-oc' into android-msm-angler-3.10-oc-security-next
49a94690 Merge branch 'android-msm-angler-3.10-oc' into android-msm-angler-3.10-oc-security-next
Linux version 3.10.73-g33ace82f84b (android-
build@xpcc7.ams.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Fri Oct 13 04:41:33
UTC 2017
Bug: 33982955
Bug: 34276203
Bug: 34329758
Bug: 34624167
Bug: 35138888
Bug: 37240993
Bug: 37429972
Bug: 62201221
Bug: 62378232
Bug: 62674846
Bug: 63100473
Bug: 63173776
Bug: 63689921
Bug: 63868933
Bug: 64431967
Bug: 64453105
Bug: 64453422
Bug: 64453423
Bug: 64728950
Bug: 65023233
Bug: 65468973
Bug: 65468975
Bug: 65468993
Bug: 67749245
Change-Id: I55e7959b30f47185851bf4ede5f2fcf05d93f332
Source-Branch: android-msm-angler-3.10
Signed-off-by: Steve Pfetsch <spfetsch@google.com>
|
|
e40328e1 Merge branch 'android-msm-angler-3.10-oc-security-next' into android-msm-angler-3.10-oc
2970ea4d msm: gud: Remove gud driver
5bc4ce2d qseecom: Fix accessing userspace memory in kernel space
3e28042f ANDROID: scsi: Add segment checking in sg_read
01517e20 msm: camera: Make use of mutex lock to avoid race condition
853d7b9c ASoC: msm: qdsp6v2: clear address on error
9a4c1e0b coresight: tmc: Fix the unbalanced lock in tmc_read()
f169d05a coresight: tmc: Fix use after free issue with tmc read
3c968bdc fbdev: msm: Allocate fd with O_CLOEXEC flag
7e173b87 msm: mdss: validate page id before reading from edid buffer
3a2e3ad0 msm: ipa: Add mutext protection when updating notify req cache
0a420e78 BACKPORT: dentry name snapshots
e508bde8 angler: remove 'reboot edl' interface for security.
4610f465 msm: sensor: Add mutex lock during ois power down operations
dbef9f3d diag: Fix for possible dci stale entries
6ccf834f diag: dci: Add protection while querying event status
f2950995 diag: dci: Add mutex protection while accessing client details
ed4971fe diag: dci: Add protection while de-initializing clients
aa469e2b ANDROID: usb: gadget: f_mtp: Return error if count is negative
0ee2dead UPSTREAM: ALSA: timer: Call notifier in the same spinlock
7624de59 UPSTREAM: ALSA: timer: Fix race between stop and interrupt
6f0ad078 UPSTREAM: ALSA: timer: Fix link corruption due to double start or stop
7788324e UPSTREAM: ALSA: timer: Code cleanup
ecc778d1 BACKPORT: ALSA: timer: Fix race at concurrent reads
c1e018be BACKPORT: ALSA: timer: Handle disconnection more safely
64c4227a UPSTREAM: ALSA: timer: Fix wrong instance passed to slave callbacks
60ad62eb UPSTREAM: ALSA: timer: Harden slave timer list handling
4e61984d UPSTREAM: ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT
21e752fc BACKPORT: ALSA: timer: Fix race between read and ioctl
d1fa005f msm: vidc: Squash the below changes
58bdb3fa v4l2: Refactor, fix security bug in compat ioctl32
cc0f3058 msm: camera: Avoid deadlock for vb2 operations using separate lock
adfa0c9a ANDROID: ion: Fix uninitialized variable
4c7961ac Bluetooth: cmtp: cmtp_add_connection() should verify that it's dealing with l2cap socket
6442d6bf Bluetooth: bnep: bnep_add_connection() should verify that it's dealing with l2cap socket
30a02c52 Merge branch 'android-msm-angler-3.10-oc' into android-msm-angler-3.10-oc-security-next
79df07b4 Merge branch 'android-msm-angler-3.10-nyc-mr2' into android-msm-angler-3.10-oc
4b39d42e Merge branch 'android-msm-angler-3.10-nyc-mr2-security-next' into android-msm-angler-3.10-nyc-mr2
77a57c44 net: usb: rmnet_usb_ctrl:Make sure list_head operate atomically
93f53a7c ASoC: msm: qdspv2: add mutex to prevent access same memory simultaneously
9c253523 msm: mdss: hdmi: check up-bound of CEC frame size
e13a16c0 msm: camera2: cpp: Fix iommu_attach/detach compat_ioctl issue
eaf19c1d UPSTREAM: brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()
dc8f7a19 SoC: msm: audio-effects: return directly to avoid integer overflow
218d3a52 msm: kgsl: Protect the event->handle with spinlock
fb50f3fa diag: Add proper synchronization checks to msg mask table
52aa15ae BACKPORT: perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race
c5f12b74 cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE
568a0573 cfg80211: Check if PMKID attribute is of expected size
c46b2ecd msm: sensor: Fix crash when ioctl VIDIOC_MSM_SENSOR_INIT_CFG
8b44a684 msm: camera: Bound check for num_of_stream.
93533f31 ALSA: pcm: prevent UAF in snd_pcm_info
19384322 ANDROID: input: keychord: fix race condition bug
c0454215 BACKPORT: FROMLIST: pids: make task_tgid_nr_ns() safe
59c0cd06 Merge branch 'android-msm-angler-3.10-nyc-mr2' into android-msm-angler-3.10-nyc-mr2-security-next
cbd5a934 Merge branch 'android-msm-angler-3.10-oc' into android-msm-angler-3.10-oc-security-next
ad82c662 Merge branch 'android-msm-angler-3.10-nyc-mr2' into android-msm-angler-3.10-oc
69169ebb Merge branch 'android-msm-angler-3.10-nyc-mr2-security-next' into android-msm-angler-3.10-nyc-mr2
bf89a6f2 Revert "Revert "msm: sps: Fix race condition in SPS debugfs APIs""
1da3ab4f Merge branch 'android-msm-angler-3.10-nyc-mr2' into android-msm-angler-3.10-oc
6f8396ea Merge branch 'android-msm-angler-3.10-nyc-mr2-security-next' into android-msm-angler-3.10-nyc-mr2
4b958503 UPSTREAM: sctp: do not inherit ipv6_{mc|ac|fl}_list from parent
270bb935 msm: camera: sensor:validating the flash initialization parameters
d5481967 compat_qcedev: Fix accessing userspace memory in kernel space
5ff192e2 ASoC: msm: qdsp6v2: add size check to fix out of bounds issue
83366dd9 net: wireless: bcmdhd: add log trace event length check
be632ce9 crypto: msm: Fix several race condition issues in crypto drivers
a42f6e19 msm: mdss: Increase fbmem buf ref count before use
7489a0a8 msm: mdss: Buffer overflow while processing gamut table data
6b5c59c1 Merge branch 'android-msm-angler-3.10-nyc-mr2' into android-msm-angler-3.10-nyc-mr2-security-next
49a94690 Merge branch 'android-msm-angler-3.10-oc' into android-msm-angler-3.10-oc-security-next
Linux version 3.10.73-ge40328e12f0 (android-
build@vpba25.mtv.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Fri Oct 13 04:03:36
UTC 2017
Bug: 31495866
Bug: 33982955
Bug: 34170483
Bug: 34276203
Bug: 34329758
Bug: 34624167
Bug: 35138888
Bug: 36006779
Bug: 36006981
Bug: 36232584
Bug: 36492827
Bug: 36818836
Bug: 36819059
Bug: 37093119
Bug: 37240993
Bug: 37284397
Bug: 37305633
Bug: 37429972
Bug: 37623773
Bug: 37893116
Bug: 37901413
Bug: 37949660
Bug: 62201221
Bug: 62298712
Bug: 62378232
Bug: 62378962
Bug: 62674846
Bug: 62827928
Bug: 62949902
Bug: 62952032
Bug: 63100473
Bug: 63173776
Bug: 63174519
Bug: 63689921
Bug: 63868933
Bug: 64258073
Bug: 64431967
Bug: 64433362
Bug: 64438726
Bug: 64440043
Bug: 64441352
Bug: 64453105
Bug: 64453422
Bug: 64453423
Bug: 64693751
Bug: 64728950
Bug: 65023233
Bug: 65468973
Bug: 65468975
Bug: 65468993
Bug: 65558908
Bug: 67749245
Change-Id: I937b383fda35bbfa725b7db69dd9cca252118581
Source-Branch: android-msm-angler-3.10-oc
Signed-off-by: Steve Pfetsch <spfetsch@google.com>
|
|
352002 snap-temp-L88700000105039240
Change-Id: Ic0c4f0cfec5b82bc79a66099b51fbc0b1c581f6d
|
|
4351869 snap-temp-L93800000104806132
Change-Id: Ibde5eae190e0d4d39801d0f979a87d2626dcfcff
|
|
71ff0801 android: binder: Move buffer out of area shared with user space
f33a1679 android: binder: Refactor prev and next buffer into a helper function
2d17309c binder: always allocate/map first BINDER_MIN_ALLOC pages
39f2da33 BACKPORT: staging: android: fix missing a blank line after declarations
dd08b3c6 UPSTREAM: Staging: Android: removed an unnecessary else statement
765a49f2 UPSTREAM: include/linux/mm.h: add PAGE_ALIGNED() helper
Linux version 3.10.73-g71ff0801fe9 (android-
build@wphs3.hot.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Wed Sep 20 19:08:44
UTC 2017
Bug: 36007193
Bug: 36727951
Change-Id: If3325f3bade6127c3b65212834b6fad070747397
Source-Branch: android-msm-angler-3.10
Signed-off-by: John Dias <joaodias@google.com>
|
|
dfa91227 Merge branch 'android-msm-angler-3.10-oc' into android-msm-angler-3.10
79df07b4 Merge branch 'android-msm-angler-3.10-nyc-mr2' into android-msm-angler-3.10-oc
4b39d42e Merge branch 'android-msm-angler-3.10-nyc-mr2-security-next' into android-msm-angler-3.10-nyc-mr2
77a57c44 net: usb: rmnet_usb_ctrl:Make sure list_head operate atomically
93f53a7c ASoC: msm: qdspv2: add mutex to prevent access same memory simultaneously
9c253523 msm: mdss: hdmi: check up-bound of CEC frame size
e13a16c0 msm: camera2: cpp: Fix iommu_attach/detach compat_ioctl issue
eaf19c1d UPSTREAM: brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()
dc8f7a19 SoC: msm: audio-effects: return directly to avoid integer overflow
218d3a52 msm: kgsl: Protect the event->handle with spinlock
fb50f3fa diag: Add proper synchronization checks to msg mask table
52aa15ae BACKPORT: perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race
c5f12b74 cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE
568a0573 cfg80211: Check if PMKID attribute is of expected size
c46b2ecd msm: sensor: Fix crash when ioctl VIDIOC_MSM_SENSOR_INIT_CFG
8b44a684 msm: camera: Bound check for num_of_stream.
93533f31 ALSA: pcm: prevent UAF in snd_pcm_info
19384322 ANDROID: input: keychord: fix race condition bug
c0454215 BACKPORT: FROMLIST: pids: make task_tgid_nr_ns() safe
59c0cd06 Merge branch 'android-msm-angler-3.10-nyc-mr2' into android-msm-angler-3.10-nyc-mr2-security-next
Linux version 3.10.73-gdfa912278a6 (android-
build@vpeb2.mtv.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Fri Sep 15 20:28:39
UTC 2017
Bug: 31495866
Bug: 36006779
Bug: 36006981
Bug: 36232584
Bug: 36492827
Bug: 36818836
Bug: 36819059
Bug: 37901413
Bug: 62378962
Bug: 62949902
Bug: 62952032
Bug: 64258073
Bug: 64433362
Bug: 64438726
Bug: 64440043
Bug: 64441352
Bug: 65558908
Change-Id: I1c971c09abe7eeb9175a6ef99c4cd8d3ad410604
Source-Branch: android-msm-angler-3.10
Signed-off-by: Andrew Lehmer <alehmer@google.com>
|
|
4335659 snap-temp-L85900000102427279
Change-Id: Ic3e5d57cc76de41c8899f850b09c9c8be5b6bad1
|
|
886fec6a BACKPORT: ANDROID: Use sk_uid to replace uid get from socket file
6d56396b ANDROID: Sdcardfs: Move gid derivation under flag
7242617b ANDROID: mnt: Fix freeing of mount data
3b7e7b8d firmware_class: Tie exporting caching routines with CONFIG_CACHE_FW
8d6c7f77 BACKPORT: arm64: cpuinfo: Missing NULL terminator in compat_hwcap_str
Linux version 3.10.73-g886fec6a74b (android-
build@vpec11.mtv.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Wed Sep 13 22:27:10
UTC 2017
Bug: 37430238
Bug: 37524657
Bug: 38289596
Bug: 63245673
Bug: 65386954
Change-Id: I3e97e8bf273edcb5ef4bfa85d99c8bf37b8b3074
Source-Branch: android-msm-angler-3.10
Signed-off-by: Todd Poynor <toddpoynor@google.com>
|
|
4321077 snap-temp-L97000000100182150
Change-Id: I43e5323686518e954f092ee772b4367ecb0d5361
|
|
0a5685c9 firmware_class: make firmware caching configurable
Linux version 3.10.73-g0a5685c9934 (android-
build@vped13.mtv.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Wed Sep 6 14:59:22
UTC 2017
Bug: 38289596
Change-Id: Ied3aeed2828e518914c79b0b223d264cef39e931
Source-Branch: android-msm-angler-3.10
Signed-off-by: Ajay Dudani <adudani@google.com>
|
|
4318546 snap-temp-L23800000099760172
Change-Id: I48f14730948b122d2928d51ce576d118fe1a5c7a
|
|
198a1474 UPSTREAM: USB: cdc-acm: more sanity checking
0cede215 UPSTREAM: USB: iowarrior: fix oops with malicious USB descriptors
62e319d8 UPSTREAM: USB: usb_driver_claim_interface: add sanity checking
863fdec2 UPSTREAM: USB: mct_u232: add sanity checking in probe
d77daf76 UPSTREAM: USB: cypress_m8: add endpoint sanity check
c8baf786 UPSTREAM: Input: powermate - fix oops with malicious USB descriptors
Linux version 3.10.73-g198a14741b8 (android-
build@wpdv15.hot.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Tue Sep 5 20:25:27
UTC 2017
Bug: 28242610
Change-Id: Ia6abf72a8bb5b4d2266b4bb9e8861629074e3f67
Source-Branch: android-msm-angler-3.10
Signed-off-by: Badhri Jagan Sridharan <Badhri@google.com>
|
|
4308825 snap-temp-L52700000098265170
Change-Id: I164208b0a18213b1837511b2f93e40ee23a515b0
|
|
665041e1 msm: camera_v2: Increase event timeout
ca50eff4 BACKPORT: dm bufio: don't take the lock in dm_bufio_shrink_count
3e9a4d68 BACKPORT: dm bufio: avoid sleeping while holding the dm_bufio lock
Linux version 3.10.73-g665041e1632 (android-
build@xpce6.ams.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Wed Aug 30 17:31:14
UTC 2017
Bug: 62393979
Bug: 64122284
Change-Id: Ib3bafe11eb4b84fbfa0963d22a6a6c52125c945d
Source-Branch: android-msm-angler-3.10
Signed-off-by: Shuzhen Wang <shuzhenwang@google.com>
|
|
4301796 snap-temp-L23200000097143969
Change-Id: I230d4f004fdff50140a5619e0a30b5f280e8eefc
|
|
b696855f msm: kgsl: Add a trace event for the GPU clock
747b2c2b ANDROID: xt_qtaguid: Use sk_callback_lock read locks before reading sk->sk_socket
Linux version 3.10.73-gb696855f478 (android-
build@vpeb9.mtv.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Thu Aug 24 20:23:28
UTC 2017
Bug: 62789671
Change-Id: Ib31ab9be520f715cb9b9cbee9632017beb93630e
Source-Branch: android-msm-angler-3.10
Signed-off-by: Steve Pfetsch <spfetsch@google.com>
|
|
4288633 snap-temp-L81700000095141745
Change-Id: I3c87af4b3d7d84983f89c8a40d446ac350699102
|
|
72c4bc96 Merge branch 'android-msm-angler-3.10-oc' into android-msm-angler-3.10
ad82c662 Merge branch 'android-msm-angler-3.10-nyc-mr2' into android-msm-angler-3.10-oc
69169ebb Merge branch 'android-msm-angler-3.10-nyc-mr2-security-next' into android-msm-angler-3.10-nyc-mr2
bf89a6f2 Revert "Revert "msm: sps: Fix race condition in SPS debugfs APIs""
8c76dd1d Merge branch 'android-msm-angler-3.10-oc' into android-msm-angler-3.10
1da3ab4f Merge branch 'android-msm-angler-3.10-nyc-mr2' into android-msm-angler-3.10-oc
6f8396ea Merge branch 'android-msm-angler-3.10-nyc-mr2-security-next' into android-msm-angler-3.10-nyc-mr2
4b958503 UPSTREAM: sctp: do not inherit ipv6_{mc|ac|fl}_list from parent
270bb935 msm: camera: sensor:validating the flash initialization parameters
d5481967 compat_qcedev: Fix accessing userspace memory in kernel space
5ff192e2 ASoC: msm: qdsp6v2: add size check to fix out of bounds issue
83366dd9 net: wireless: bcmdhd: add log trace event length check
be632ce9 crypto: msm: Fix several race condition issues in crypto drivers
a42f6e19 msm: mdss: Increase fbmem buf ref count before use
7489a0a8 msm: mdss: Buffer overflow while processing gamut table data
22dd1375 UPSTREAM: arm64: perf: Fix callchain parse error with kernel tracepoint events
560a20f7 UPSTREAM: ARM: 8170/1: Add global named register current_stack_pointer for ARM
2faf622d UPSTREAM: arm64: LLVMLinux: Add current_stack_pointer() for arm64
9c6fc222 UPSTREAM: arm: perf: Fix callchain parse error with kernel tracepoint events
6b5c59c1 Merge branch 'android-msm-angler-3.10-nyc-mr2' into android-msm-angler-3.10-nyc-mr2-security-next
Linux version 3.10.73-g72c4bc96c68 (android-
build@wphr4.hot.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Wed Aug 16 15:24:08
UTC 2017
Bug: 34170483
Bug: 37093119
Bug: 37284397
Bug: 37305633
Bug: 37623773
Bug: 37893116
Bug: 37949660
Bug: 62298712
Bug: 62827928
Bug: 63174519
Bug: 64693751
Change-Id: I0b04670c59eff5d1eebe9a19e39a69fc6b4961fe
Source-Branch: android-msm-angler-3.10
Signed-off-by: Andrew Lehmer <alehmer@google.com>
|
|
4237114 snap-temp-L83200000088245566
Change-Id: Id575b95073f36343ae375361b08370130b45abd8
|
|
fe989e28 Revert "Revert "BACKPORT: crypto: msm: Fix buffer overflow issue""
f7f8b89f Revert "Revert "msm: sps: Fix race condition in SPS debugfs APIs""
a272401b Revert "Revert "msm: camera: isp: Avoid information leak in ISPIF""
13907f95 Revert "Revert "msm: sensor: Validationg function pointers before using them""
eef07d77 Revert "Revert "msm: camera: validate num_streams in stream_cfg_cmd before using it""
d584b424 Revert "Revert "dm ioctl: prevent stack leak in dm ioctl call""
6f8aa828 Revert "Revert "BACKPORT: ALSA: timer: Fix race between read and ioctl""
fa8d9c05 Revert "Revert "UPSTREAM: ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT""
cf6b0d95 UPSTREAM: af_key: Fix sadb_x_ipsecrequest parsing
ee81fb9d Merge branch 'android-msm-angler-3.10-oc' into android-msm-angler-3.10
e5118710 ANDROID: sdcardfs: Remove unnecessary lock
36cc0cc1 Merge branch 'android-msm-angler-3.10-oc' into android-msm-angler-3.10
02cd3599 Add kernel logging for when timerfd_read blocks
66e41497 Make the VTI code compile.
Linux version 3.10.73-gfe989e280b3 (android-
build@kpfj2.cbf.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Tue Jul 25 22:33:17
UTC 2017
Bug: 33548839
Bug: 35644370
Bug: 36232584
Bug: 37239119
Bug: 37438302
Bug: 38027632
Bug: 38042165
Bug: 62201221
Bug: 63174519
Bug: 63785372
Bug: 63963140
Change-Id: I66cd2a52659e2fca1daadbf9b613d02a0bb6388e
Source-Branch: android-msm-angler-3.10
Signed-off-by: Siqi Lin <siqilin@google.com>
|
|
4222039 snap-temp-L91400000086509174
Change-Id: Ia8c8c5d3d68fe9e9d0d8899542f27eb9ac96541e
|
|
db7d3bc7a1
am: 7a1661d2fb
Change-Id: I7da0a90970d5c446565428371640128d3d861e28
|
|
am: db7d3bc7a1
Change-Id: Ie7de991642c3dfe39d674640d522ad3a5332f476
|
|
am: 40f3310324 -s ours
Change-Id: Ia71adb803405105103f3052e43e794138be51db8
|
|
am: 417e7888c3
Change-Id: I294f89195f727bd25999db38384e1f6edcb0a8a7
|
|
am: 572b7e0379
Change-Id: Ia8dc622abf74af50d04651bd272bbfa91b73e8bd
|
|
10836006 Merge branch 'android-msm-angler-3.10-nyc-mr2' into android-msm-angler-3.10-oc
ff69a6ab Merge branch 'android-msm-angler-3.10-nyc-mr2-security-next' into android-msm-angler-3.10-nyc-mr2
62450535 Revert "BACKPORT: crypto: msm: Fix buffer overflow issue"
75c9faea Revert "msm: sps: Fix race condition in SPS debugfs APIs"
995b1a9d Revert "msm: camera: isp: Avoid information leak in ISPIF"
e975fb49 Revert "msm: sensor: Validationg function pointers before using them"
e72bbd23 Revert "msm: camera: validate num_streams in stream_cfg_cmd before using it"
09f42849 Revert "dm ioctl: prevent stack leak in dm ioctl call"
6353f421 Revert "BACKPORT: ALSA: timer: Fix race between read and ioctl"
1316fe8d Revert "UPSTREAM: ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT"
772abc17 Merge branch 'android-msm-angler-3.10-nyc-mr2' into android-msm-angler-3.10-oc
25d4dc26 Merge branch 'android-msm-angler-3.10-nyc-mr2-security-next' into android-msm-angler-3.10-nyc-mr2
4f864a51 msm: camera: isp: fix for out of bound access array
b46b3d11 ASoC: msm: remove unused msm-compr-q6-v2
ddbd0ffb msm: camera: Allow driver file to be opend only once.
df48ee2a soc: qcom: msm_bus: add mutex lock for cllist data
4ac61e37 BACKPORT: ipv6/dccp: do not inherit ipv6_mc_list from parent
c58c9355 UPSTREAM: ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT
59a480f3 BACKPORT: ALSA: timer: Fix race between read and ioctl
25cce4e9 BACKPORT: ext4: fix data exposure after a crash
1853870b BACKPORT: dccp/tcp: do not inherit mc_list from parent
694af1cf UPSTREAM: mm: fix new crash in unmapped_area_topdown()
07cf73fe BACKPORT: mm: larger stack guard gap, between vmas
80c34750 msm: camera: isp: Handle array out of bounds
5479a3c1 mm: Fix incorrect type conversion for size during dma allocation
a8d5056f ASoC: msm: qdsp6v2: extend validation of virtual address
99bc4352 msm: sensor: Validationg function pointers before using them
b856d725 UPSTREAM: tcp: avoid infinite loop in tcp_splice_read()
453fafad UPSTREAM: packet: fix races in fanout_add()
5c98138b BACKPORT: ip6_gre: fix ip6gre_err() invalid reads
eef1c178 UPSTREAM: mm/mempolicy.c: fix error handling in set_mempolicy and mbind.
08ccf853 net: wireless: bcmdhd: adding boundary check for pfn events
58168423 net: wireless: bcmdhd: Remove "dhd_handle_swc_evt" from dhd.
c3fab4bc BACKPORT: crypto: msm: Fix buffer overflow issue
5575ff40 net: wireless: bcmdhd: add boundary check in GSCAN full result handler
68acc6ab net: wireless: bcmdhd: adding boudary check in wl_escan_handler
2935fde9 net: wireless: bcmdhd: adding boundary check in wl_notify_rx_mgmt_frame
f35ce58f net: wireless: bcmdhd: add boundary check in dhd_rtt_event_handler
5a6c6240 msm: camera: isp: Avoid information leak in ISPIF
2ae1eab5 msm: camera: fix untrusted pointer for power down setting
8fa7f496 msm: ipa: fix security issues in ipa wan driver
61ff1539 msm:camera: correct stats query out of boundary
3631826a msm: camera: validate num_streams in stream_cfg_cmd before using it
26329473 msm: camera: fix off-by-one overflow in msm_isp_get_bufq
1da242a7 Prevent potential double frees in sg driver
2c451e57 dm ioctl: prevent stack leak in dm ioctl call
1a68951f msm: camera: Fix Use after free bug in msm_vb2.c.
d965e968 msm: camera: Use mutex lock to avoid race condition
dff69102 msm: sps: Fix race condition in SPS debugfs APIs
230dc021 msm: pcie: add bounds check for debugfs register write
0a95bed9 Merge android-msm-angler-3.10-nyc-mr2 into android-msm-angler-3.10-nyc-mr2-security-next
Linux version 3.10.73-g10836006bc5 (android-
build@wpds10.hot.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Mon Jul 24 18:00:41
UTC 2017
Bug: 33039685
Bug: 33548839
Bug: 34329758
Bug: 35099636
Bug: 35644370
Bug: 35644812
Bug: 36136563
Bug: 36232584
Bug: 36264696
Bug: 36490777
Bug: 36492827
Bug: 37239119
Bug: 37305578
Bug: 37306719
Bug: 37351060
Bug: 37357704
Bug: 37438302
Bug: 37685267
Bug: 37722328
Bug: 37722970
Bug: 37751399
Bug: 37871211
Bug: 37897645
Bug: 37901268
Bug: 38027632
Bug: 38195131
Bug: 38195738
Bug: 38196031
Bug: 38413813
Bug: 38413975
Bug: 62198330
Bug: 62201221
Bug: 62299478
Bug: 62378596
Bug: 62378684
Bug: 62379475
Bug: 62379525
Bug: 63174519
Change-Id: I64b8dc62155d93aad1d6b61379e76d78ad251e50
Source-Branch: android-msm-angler-3.10-oc
Signed-off-by: Siqi Lin <siqilin@google.com>
|
|
ff69a6ab Merge branch 'android-msm-angler-3.10-nyc-mr2-security-next' into android-msm-angler-3.10-nyc-mr2
62450535 Revert "BACKPORT: crypto: msm: Fix buffer overflow issue"
75c9faea Revert "msm: sps: Fix race condition in SPS debugfs APIs"
995b1a9d Revert "msm: camera: isp: Avoid information leak in ISPIF"
e975fb49 Revert "msm: sensor: Validationg function pointers before using them"
e72bbd23 Revert "msm: camera: validate num_streams in stream_cfg_cmd before using it"
09f42849 Revert "dm ioctl: prevent stack leak in dm ioctl call"
6353f421 Revert "BACKPORT: ALSA: timer: Fix race between read and ioctl"
1316fe8d Revert "UPSTREAM: ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT"
25d4dc26 Merge branch 'android-msm-angler-3.10-nyc-mr2-security-next' into android-msm-angler-3.10-nyc-mr2
4f864a51 msm: camera: isp: fix for out of bound access array
b46b3d11 ASoC: msm: remove unused msm-compr-q6-v2
ddbd0ffb msm: camera: Allow driver file to be opend only once.
df48ee2a soc: qcom: msm_bus: add mutex lock for cllist data
4ac61e37 BACKPORT: ipv6/dccp: do not inherit ipv6_mc_list from parent
c58c9355 UPSTREAM: ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT
59a480f3 BACKPORT: ALSA: timer: Fix race between read and ioctl
25cce4e9 BACKPORT: ext4: fix data exposure after a crash
1853870b BACKPORT: dccp/tcp: do not inherit mc_list from parent
694af1cf UPSTREAM: mm: fix new crash in unmapped_area_topdown()
07cf73fe BACKPORT: mm: larger stack guard gap, between vmas
80c34750 msm: camera: isp: Handle array out of bounds
5479a3c1 mm: Fix incorrect type conversion for size during dma allocation
a8d5056f ASoC: msm: qdsp6v2: extend validation of virtual address
99bc4352 msm: sensor: Validationg function pointers before using them
b856d725 UPSTREAM: tcp: avoid infinite loop in tcp_splice_read()
453fafad UPSTREAM: packet: fix races in fanout_add()
5c98138b BACKPORT: ip6_gre: fix ip6gre_err() invalid reads
eef1c178 UPSTREAM: mm/mempolicy.c: fix error handling in set_mempolicy and mbind.
08ccf853 net: wireless: bcmdhd: adding boundary check for pfn events
58168423 net: wireless: bcmdhd: Remove "dhd_handle_swc_evt" from dhd.
c3fab4bc BACKPORT: crypto: msm: Fix buffer overflow issue
5575ff40 net: wireless: bcmdhd: add boundary check in GSCAN full result handler
68acc6ab net: wireless: bcmdhd: adding boudary check in wl_escan_handler
2935fde9 net: wireless: bcmdhd: adding boundary check in wl_notify_rx_mgmt_frame
f35ce58f net: wireless: bcmdhd: add boundary check in dhd_rtt_event_handler
5a6c6240 msm: camera: isp: Avoid information leak in ISPIF
2ae1eab5 msm: camera: fix untrusted pointer for power down setting
8fa7f496 msm: ipa: fix security issues in ipa wan driver
61ff1539 msm:camera: correct stats query out of boundary
3631826a msm: camera: validate num_streams in stream_cfg_cmd before using it
26329473 msm: camera: fix off-by-one overflow in msm_isp_get_bufq
1da242a7 Prevent potential double frees in sg driver
2c451e57 dm ioctl: prevent stack leak in dm ioctl call
1a68951f msm: camera: Fix Use after free bug in msm_vb2.c.
d965e968 msm: camera: Use mutex lock to avoid race condition
dff69102 msm: sps: Fix race condition in SPS debugfs APIs
230dc021 msm: pcie: add bounds check for debugfs register write
0a95bed9 Merge android-msm-angler-3.10-nyc-mr2 into android-msm-angler-3.10-nyc-mr2-security-next
Linux version 3.10.73-gff69a6ab665 (android-
build@wphr3.hot.corp.google.com) (gcc version 4.9.x-google
20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Mon Jul 24 17:58:45
UTC 2017
Bug: 33039685
Bug: 33548839
Bug: 34329758
Bug: 35099636
Bug: 35644370
Bug: 35644812
Bug: 36136563
Bug: 36232584
Bug: 36264696
Bug: 36490777
Bug: 36492827
Bug: 37239119
Bug: 37305578
Bug: 37306719
Bug: 37351060
Bug: 37357704
Bug: 37438302
Bug: 37685267
Bug: 37722328
Bug: 37722970
Bug: 37751399
Bug: 37871211
Bug: 37897645
Bug: 37901268
Bug: 38027632
Bug: 38195131
Bug: 38195738
Bug: 38196031
Bug: 38413813
Bug: 38413975
Bug: 62198330
Bug: 62201221
Bug: 62299478
Bug: 62378596
Bug: 62378684
Bug: 62379475
Bug: 62379525
Bug: 63174519
Change-Id: Iee6dd55d9c2d1ab765d09f86c27318ddf4b47192
Source-Branch: android-msm-angler-3.10-nyc-mr2
Signed-off-by: Siqi Lin <siqilin@google.com>
|
|
4111654 snap-temp-L22900000075285650
Change-Id: I25a979fb7e4e1ef27814bac78a7b1d2c331f0211
|
|
oc-dr1-dev-plus-aosp
am: 40e0ae52ff
Change-Id: I9c1719b0694dc7d23d795eae7403ba7b9c7963a8
|
|
am: df8d63da12
Change-Id: I4f95e5e2644ac43645e940845a763cda7806bdf5
|
|
oc-dr1-dev-plus-aosp
|
|
am: 5263f25b19
Change-Id: I55c3b42eb7c0e5b1b9ab241791a952768f1831a9
|