summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSiyuan Zhou <siyuanzhou@google.com>2018-03-14 14:58:56 -0700
committerandroid-build-team Robot <android-build-team-robot@google.com>2018-03-15 18:33:14 +0000
commitdc0f7d192fcc1bbab4153fee7f5aa1e4353ebfcc (patch)
tree2faeddec1e38fe9a6342a4129f8e78e38c5ad408
parent9bf45450ce3c21bd289eba8ac9897606d3d04cac (diff)
downloadbullhead-kernel-dc0f7d192fcc1bbab4153fee7f5aa1e4353ebfcc.tar.gz
bullhead: update kernel prebuilt
d5f156e7 Merge branch 'android-msm-bullhead-3.10-security-next' into android-msm-bullhead-3.10 76be9810 nl80211: Define policy for packet pattern attributes bfa5b61b msm: rmnet_ipa: fix memory overflow issue dfd0459c qcacld-2.0: Add sanity check for vdev_id in wma_wow_wakeup_host_event 3a571e09 qcacld-2.0: Add sanity check for vdev id to prevent OOB access e2a8ef49 qcacld-2.0: Calculate buf_len properly for extscan hotlist event buffer 5d25d8a2 qcacld-2.0: Validate packet length, before processing PTT commands a63aac90 msm: ipa3: add lock for num_q6_rule 891c90f0 BACKPORT: USB: core: harden cdc_parse_cdc_header c9bd2cd9 UPSTREAM: KEYS: encrypted: fix buffer overread in valid_master_desc() 9dc7a159 BACKPORT: net: ipv4: fix for a race condition in raw_sendmsg cd7093ed qcacld-2.0: Fix Integer overflow in wma_tbttoffset_update_event_handler() c6b6e21f qcacld-2.0: Fix buffer overwrite in wma_extscan_rsp_handler 528712e7 qcacld-2.0: Fix buffer overwrite in wma_sap_ofl_add_sta_handler 34a2619b qcacld-2.0: Check for valid vdev ID in SWBA event handler f6214fdc ASoC: apr: Add validity check to APR port 85d269c7 msm: ipa: Fix the handling of default IPA header f06ca6bb qcacld-2.0: Fix buffer overread in wma_extscan_hotlist_match_event_handler e6f38cf1 qcacld-2.0: Fix buffer overrun in function ProcSetReqInternal 9b9ceab4 qcacld-2.0: Fix potential buffer overflow in htt_t2h_lp_msg_handler 9ae8fd63 qcacld-2.0: Fix potential buffer overflow in ol_rx_flush_handler cabd0479 qcacld-2.0: Fix potential buffer overflow in process_tx_info a27f289f Merge branch 'android-msm-bullhead-3.10' into android-msm-bullhead-3.10-security-next Linux version 3.10.73-gd5f156e7af96 (android- build@xpcc4.ams.corp.google.com) (gcc version 4.9.x-google 20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Wed Mar 14 20:58:58 UTC 2018 Bug: 33967002 Bug: 64403015 Bug: 65853393 Bug: 68992477 Bug: 69052594 Bug: 70526974 Bug: 71500434 Bug: 71501686 Bug: 71501687 Bug: 71501691 Bug: 71501692 Bug: 71501694 Bug: 71501695 Bug: 72956842 Bug: 72956920 Bug: 72956997 Bug: 72957136 Bug: 72957177 Bug: 72957235 Bug: 72957269 Bug: 73499097 Bug: 74613955 Change-Id: If49df4fb6543d3bc0b5ed7ac8d83522faf0f036e Source-Branch: android-msm-bullhead-3.10 Signed-off-by: Siyuan Zhou <siyuanzhou@google.com> (cherry picked from commit 5ce36521755652cb2622340861c8df62b2aed9d3)
-rw-r--r--Image.gz-dtbbin10829785 -> 10831762 bytes
1 files changed, 0 insertions, 0 deletions
diff --git a/Image.gz-dtb b/Image.gz-dtb
index 01db8d2..1543059 100644
--- a/Image.gz-dtb
+++ b/Image.gz-dtb
Binary files differ