Age | Commit message (Collapse) | Author |
|
am: e16ea93c3e -s ours
Change-Id: If0758a688b4bf365c0e8e6cab17348dea0bb271d
|
|
8cdac91 fs: ext4: disable support for fallocate FALLOC_FL_PUNCH_HOLE
6ce1638 msm: ipa: fix potential race condition ioctls
00c0041 msm: camera: Fix memory read by adding bounds check
8b27587 BACKPORT: netfilter: x_tables: validate e->target_offset early
87a45ab UPSTREAM: netfilter: x_tables: make sure e->next_offset covers remaining blob size
d74b9cf BACKPORT: cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind
dd8d18b UPSTREAM: ASoC: wcd9xxx: Fix unprotected userspace access
aa7870c BACKPORT: KEYS: potential uninitialized variable
4e660da UPSTREAM: ipv6: Don't reduce hop limit for an interface
a973789 UPSTREAM: udp: fix behavior of wrong checksums
9199349 UPSTREAM: ppp: take reference on channels netns
07a8da2 UPSTREAM: netfilter: x_tables: fix unconditional helper
975fb28 qcom: ssr: Fix possible overflow when copying firmware name
1496999 msm-core: debug: Fix the number of arguments for sysfs nodes
10170f6 UPSTREAM: KEYS: Fix ASN.1 indefinite length object parsing
e9bd747 BACKPORT: unix: avoid use-after-free in ep_remove_wait_queue
aaab158 BACKPORT: ASN.1: Fix non-match detection failure on data overrun
f5f7319 ASoC: msm: qdsp6v2: check param length for EAC3 format
05004ff spmi: prevent showing the address of spmidev
bf2b5ff net: wireless: bcmdhd: security vulnerability - protect array overflow in PNO
c0c4c7d Update build config for NYC branch
Linux version 3.10.73-g8cdac91 (android-build@wpiv4.hot.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Wed Jul 20 21:35:52 UTC 2016 ( nyc )
Bug: 28675151
Bug: 28744625
Bug: 28751627
Bug: 28760453
Bug: 28760543
Bug: 28815326
Bug: 28868303
Bug: 28919863
Bug: 28940694
Bug: 28967028
Bug: 28979703
Bug: 29009982
Bug: 29119002
Bug: 29409847
Bug: 29507402
Bug: 29512527
Bug: 29637687
Bug: 29814470
Bug: 29823941
Change-Id: I042a36327222d1b559051790b207239a03379f58
Source-Branch: android-msm-angler-3.10-nyc
Signed-off-by: Thierry Strudel <tstrudel@google.com>
|
|
afa627b Merge branch 'android-msm-angler-3.10-security-next' into android-msm-angler-3.10
f0ac071 fs: ext4: disable support for fallocate FALLOC_FL_PUNCH_HOLE
f040001 net: wireless: bcmdhd: Check to avoid sending Disassoc in unassociated state
8d9667d trace: net: use %pK for kernel pointers
339b24b msm: ipa: fix potential race condition ioctls
74f1084 msm: camera: Fix memory read by adding bounds check
ce69b54 BACKPORT: netfilter: x_tables: validate e->target_offset early
e0d7224 UPSTREAM: netfilter: x_tables: make sure e->next_offset covers remaining blob size
e32cc3b Revert "netfilter: have ip*t REJECT set the sock err when an icmp is to be sent"
6d2b9c6 BACKPORT: cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind
b96b9a1 BACKPORT: KEYS: potential uninitialized variable
90c3c49 UPSTREAM: ipv6: Don't reduce hop limit for an interface
dc13bca UPSTREAM: udp: fix behavior of wrong checksums
2b0e7c6 UPSTREAM: ppp: take reference on channels netns
40d2c08 UPSTREAM: netfilter: x_tables: fix unconditional helper
f2c3726 qcom: ssr: Fix possible overflow when copying firmware name
dbce70b msm-core: debug: Fix the number of arguments for sysfs nodes
c435a4a UPSTREAM: KEYS: Fix ASN.1 indefinite length object parsing
8a292b0 BACKPORT: unix: avoid use-after-free in ep_remove_wait_queue
182398b BACKPORT: ASN.1: Fix non-match detection failure on data overrun
874b827 ASoC: msm: qdsp6v2: check param length for EAC3 format
ce08842 spmi: prevent showing the address of spmidev
2bacd76 Revert "spmi: prevent showing the address of spmidev"
d76158b spmi: prevent showing the address of spmidev
7236d6f net: wireless: bcmdhd: security vulnerability - protect array overflow in PNO
9e4ac41 UPSTREAM: ASoC: wcd9xxx: Fix unprotected userspace access
Linux version 3.10.73-gafa627b (android-build@wpee7.hot.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Wed Jul 20 21:32:08 UTC 2016 (master)
Bug: 28336924
Bug: 28675151
Bug: 28719525
Bug: 28744625
Bug: 28751627
Bug: 28760453
Bug: 28760543
Bug: 28815326
Bug: 28868303
Bug: 28919863
Bug: 28940694
Bug: 28967028
Bug: 28979703
Bug: 29009982
Bug: 29119002
Bug: 29409847
Bug: 29507402
Bug: 29512527
Bug: 29637687
Bug: 29814470
Bug: 29823941
Bug: 30090733
Change-Id: I80acb2686224f55f9159ceaa1d481e395fff8faa
Source-Branch: android-msm-angler-3.10
Signed-off-by: Thierry Strudel <tstrudel@google.com>
|
|
c080885 fs: ext4: disable support for fallocate FALLOC_FL_PUNCH_HOLE
9f9a275 msm: ipa: fix potential race condition ioctls
e76614b msm: camera: Fix memory read by adding bounds check
6cb1c81 BACKPORT: netfilter: x_tables: validate e->target_offset early
ca6a813 UPSTREAM: netfilter: x_tables: make sure e->next_offset covers remaining blob size
77ce241 BACKPORT: cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind
0a5929a BACKPORT: KEYS: potential uninitialized variable
662e9d1 UPSTREAM: ipv6: Don't reduce hop limit for an interface
5bb7c78 UPSTREAM: udp: fix behavior of wrong checksums
a3b998c UPSTREAM: ppp: take reference on channels netns
e62372b UPSTREAM: netfilter: x_tables: fix unconditional helper
d15d646 qcom: ssr: Fix possible overflow when copying firmware name
14d3d17 msm-core: debug: Fix the number of arguments for sysfs nodes
b6e74ac UPSTREAM: KEYS: Fix ASN.1 indefinite length object parsing
6ff7d6e BACKPORT: unix: avoid use-after-free in ep_remove_wait_queue
59f8c77 BACKPORT: ASN.1: Fix non-match detection failure on data overrun
441f25c ASoC: msm: qdsp6v2: check param length for EAC3 format
914bf37 spmi: prevent showing the address of spmidev
93da96c net: wireless: bcmdhd: security vulnerability - protect array overflow in PNO
cd93a572 UPSTREAM: ASoC: wcd9xxx: Fix unprotected userspace access
Linux version 3.10.73-gc080885 (android-build@vpba24.mtv.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Wed Jul 20 21:25:36 UTC 2016 ( mdr-1.6 )
Bug: 28675151
Bug: 28744625
Bug: 28751627
Bug: 28760453
Bug: 28760543
Bug: 28815326
Bug: 28868303
Bug: 28919863
Bug: 28940694
Bug: 28967028
Bug: 28979703
Bug: 29009982
Bug: 29119002
Bug: 29409847
Bug: 29507402
Bug: 29512527
Bug: 29637687
Bug: 29814470
Bug: 29823941
Change-Id: Idd6b4680448c87974e2729f556ba45bafca51536
Source-Branch: android-msm-angler-3.10-mdr-1.6
Signed-off-by: Thierry Strudel <tstrudel@google.com>
|
|
|
|
am: aab3f9da9f
Change-Id: Id02a80c5e2412a33809a72f648f7be289d83ede3
|
|
2c58c9f msm: vidc: update the check to ignore extradata plane in dqbuf
be15a67 msm: vidc: add ion_handle checking before mapping buffers
Linux version 3.10.73-g2c58c9f (android-build@vpec4.mtv.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Fri Jul 1 00:29:55 UTC 2016 (master)
Bug: 28747768
Bug: 29895967
Change-Id: I95f2a92d8b23ee4b4e10115c8fee58ce8c5ddfd8
Source-Branch: android-msm-angler-3.10
Signed-off-by: Thierry Strudel <tstrudel@google.com>
|
|
|
|
am: 83fdc118ad
Change-Id: Ief72903c515126012e8a5f8bedf1ee9338310d23
|
|
am: 5cebd0e2c4 -s ours
Change-Id: I1c8b05f1a0a4ed2ba7b3208ff5f462e03eb0a514
|
|
am: 382d2b4ba7
Change-Id: Ie17f99dae0711cb175c0a26636fc7b1178cbda49
|
|
a3a38c2 Merge branch 'android-msm-angler-3.10-security-next' into android-msm-angler-3.10
6169d43 net: wireless: bcmdhd: security enhancement for BRCM ether type
4f73f70 angler_defconfig: enable SECURITY_PERF_EVENTS_RESTRICT
0521171 ANDROID: restrict access to perf events
a553d0b FROMLIST: security,perf: Allow further restriction of perf_event_open
6d82bd8 BACKPORT: perf tools: Document the perf sysctls
719a158 UPSTREAM: ALSA: timer: Fix leak in events via snd_timer_user_ccallback
3046013 UPSTREAM: ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
d3cf6c1 UPSTREAM: ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
4c5fdee UPSTREAM: ALSA: timer: Fix race among timer ioctls
fcdf3a83 UPSTREAM: ALSA: compress: fix an integer overflow check
34103cd ipv6: add complete rcu protection around np->opt
9367856 UPSTREAM: usbnet: cleanup after bind() in probe()
326caaa sched: Fix information leak in sys_sched_getattr()
8a17a89 net: validate the range we feed to iov_iter_init() in sys_sendto/sys_recvfrom
23475b62 fix infoleak in rtnetlink
94770e6 USB: usbfs: fix potential infoleak in devio
d9b36d3 msm: kgsl: Defer adding the mem entry to a process
ce3fbc4 perf: arm64: fix RCU usage on pmu resume from low-power
9445cca perf: arm64: implement CPU_PM notifier
0964846 Revert "Perf: arm64: support hotplug and power collapse"
ccd1179 Revert "Perf: arm64: fix disable of pmu irq during hotplug"
62d22fd Revert "Perf: arm64: restore registers after reset"
3ce0ff7 Revert "Perf: arm64: stop counters when going into hotplug"
Linux version 3.10.73-ga3a38c2 (android-build@vped7.mtv.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Wed Jun 22 00:25:34 UTC 2016 (master)
Bug: 26492805
Bug: 28026365
Bug: 28086229
Bug: 28377352
Bug: 28592007
Bug: 28619695
Bug: 28620102
Bug: 28694392
Bug: 28731691
Bug: 28744625
Bug: 28746669
Bug: 28759139
Bug: 28980217
Bug: 28980557
Bug: 29054680
Bug: 29119870
Change-Id: Ib9312304104ec62a49d39f3df35a5bc856ebc741
Source-Branch: android-msm-angler-3.10
Signed-off-by: Thierry Strudel <tstrudel@google.com>
|
|
909746b angler_defconfig: enable SECURITY_PERF_EVENTS_RESTRICT
113d275 ANDROID: restrict access to perf events
0636896 FROMLIST: security,perf: Allow further restriction of perf_event_open
e97ee60 BACKPORT: perf tools: Document the perf sysctls
0f5012b UPSTREAM: ALSA: timer: Fix leak in events via snd_timer_user_ccallback
fcafa92 UPSTREAM: ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
14b5090 UPSTREAM: ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
5a3cb744 UPSTREAM: ALSA: timer: Fix race among timer ioctls
f0d3f33 UPSTREAM: ALSA: compress: fix an integer overflow check
db73188 ipv6: add complete rcu protection around np->opt
ccfe9ac UPSTREAM: usbnet: cleanup after bind() in probe()
58386cf sched: Fix information leak in sys_sched_getattr()
45e033c net: validate the range we feed to iov_iter_init() in sys_sendto/sys_recvfrom
bf102ff fix infoleak in rtnetlink
f90030b USB: usbfs: fix potential infoleak in devio
973f413 msm: kgsl: Defer adding the mem entry to a process
91478db perf: arm64: fix RCU usage on pmu resume from low-power
9225f64 perf: arm64: implement CPU_PM notifier
103b9d9 Revert "Perf: arm64: support hotplug and power collapse"
f287d49 Revert "Perf: arm64: fix disable of pmu irq during hotplug"
f6e83ee Revert "Perf: arm64: restore registers after reset"
c23d8c7 Revert "Perf: arm64: stop counters when going into hotplug"
fe5698c spi-contexthub: fix double free vulnerability
Linux version 3.10.73-g909746b (android-build@wpef10.hot.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Tue Jun 21 22:51:13 UTC 2016 ( mdr-1.6 )
Bug: 28026365
Bug: 28086229
Bug: 28377352
Bug: 28592007
Bug: 28619695
Bug: 28620102
Bug: 28694392
Bug: 28731691
Bug: 28744625
Bug: 28746669
Bug: 28759139
Bug: 28817378
Bug: 28980217
Bug: 28980557
Bug: 29054680
Bug: 29119870
Change-Id: I5ecd0935225e80a76c3923d0f1f88f108f13cd82
Source-Branch: android-msm-angler-3.10-mdr-1.6
Signed-off-by: Thierry Strudel <tstrudel@google.com>
|
|
|
|
am: ebce5734e5
Change-Id: I079930be86350b289e126cdfc7e7dc7fff44e213
|
|
c4340bf net: wireless: bcmdhd: fix for wl_wifi wakelock leak issue
Linux version 3.10.73-gc4340bf (android-build@wpee21.hot.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Mon Jun 20 21:01:11 UTC 2016
Bug: 29159680
Change-Id: I2867f8cd930fd6f306d285a8c43e9927a2ba0f09
Signed-off-by: Gilad Avidov <giladavidov@google.com>
|
|
|
|
am: 23be1e13d2
Change-Id: Ib189ba0224957e374856e02fbac76aeb9e4fcc2b
|
|
2c84425 ANDROID: dm verity fec: initialize recursion level
Linux version 3.10.73-g2c84425 (android-build@vpee7.mtv.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Fri Jun 17 21:22:18 UTC 2016 (master)
Bug: 28943429
Change-Id: I96c31d2cb374f63cc07263ec5a65ab623db42487
Source-Branch: android-msm-angler-3.10
Signed-off-by: Thierry Strudel <tstrudel@google.com>
|
|
am: 430bd41cc0
Change-Id: I31e8c09dce5ae27786286dbc29f7da9ad1096991
|
|
0402c17 net: wireless: bcmdhd: adding cient error reporting in msm-pci
Linux version 3.10.73-g0402c17 (android-build@wpiv12.hot.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Thu Jun 16 21:34:49 UTC 2016
Bug: 25728637
Bug: 29152165
Change-Id: Ie641c5e7296e4050dd634d11cedf307f1726bf82
Signed-off-by: Ecco Park <eccopark@google.com>
|
|
am: 517c635ed5
Change-Id: I69e91d1a587e53835f5802e23b79a88c42a1566a
|
|
e677531 cpu: send KOBJ_ONLINE event when enabling cpus
Linux version 3.10.73-ge677531 (android-build@wpdv3.hot.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Thu Jun 16 03:34:44 UTC 2016
Bug: 29359497
Change-Id: I2a65455d2f412e6b6dde79b1df2e854f28aa53f1
Signed-off-by: Thierry Strudel <tstrudel@google.com>
|
|
|
|
am: 342aa2ac46
Change-Id: Ica5248ec06fa94391817eaf4600ade276447840e
|
|
am: e8370a16fd
Change-Id: I2be4f9604542ee46bd98115018aeb79fc7d2c5db
|
|
am: 7806c64761 -s ours
Change-Id: I1b5d909bc81bce411e6b812efaf29d99321aa284
|
|
1d78b51 Merge branch 'android-msm-angler-3.10-security-next' into android-msm-angler-3.10
9a37eaf Asoc:msm:Added Buffer overflow check
b5a44a9 ANDROID: dm verity fec: add missing release from fec_ktype
9cd30b0 ANDROID: dm verity fec: limit error correction recursion
580836c diag: Fix possible underflow/overflow issues
9b9bde8 net: wireless: bcmdhd: Increase default timeout config for RTT
e04e76c ASoC: msm: audio-effects: misc fixes in h/w effects (update)
a7d2635 ASoC: msm: audio-effects: misc fixes in h/w accelerated effect
69b320c Replace %p with %pK to prevent leaking kernel address
7ed997c tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)
84d8c81 msm: perf: Do not allocate new hw_event if event is duplicate.
fa4acaa msm: kgsl: Avoid race condition in ioctl_syncsource_destroy
4217aae USB: dwc3: debugfs: Add boundary check in dwc3_store_ep_num()
5266303 msm: camera: sensor: Validate step_boundary
757c79c Revert "arm64: Introduce execute-only page access permissions"
8096090 AIO: properly check iovec sizes
bd17ae8 usb: f_serial: Check for SMD data length in GSER_IOCTL
Linux version 3.10.73-g1d78b51 (android-build@wpef30.hot.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Fri Jun 10 17:45:25 UTC 2016 (master)
Bug: 27532522
Bug: 27657963
Bug: 27890772
Bug: 27928374
Bug: 28084795
Bug: 28172137
Bug: 28172322
Bug: 28409131
Bug: 28470967
Bug: 28557020
Bug: 28588279
Bug: 28639010
Bug: 28751152
Bug: 28767796
Bug: 28943429
Change-Id: I7359db0922ac36a97b2ee3ecbfe88f45c2b8681a
Signed-off-by: Patrick Tjin <pattjin@google.com>
|
|
46b9920 Merge branch 'android-msm-angler-3.10-mdr-1.6-security-next' into android-msm-angler-3.10-mdr-1.6
09f3e39 Asoc:msm:Added Buffer overflow check
c5449bf diag: Fix possible underflow/overflow issues
Linux version 3.10.73-g46b9920 (android-build@vpef14.mtv.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Fri Jun 10 06:14:43 UTC 2016 (mdr-1.6)
Bug: 28751152
Bug: 28767796
Change-Id: Idb825a68d4fe9ab4e9e9cdb192d837e15b5d4f11
Signed-off-by: Patrick Tjin <pattjin@google.com>
|
|
am: 906b14fe78
Change-Id: I646181b68d68b9d5273bde0a014d504f4d0e27d2
|
|
am: 47be4dceea -s ours
Change-Id: I69ae435f8919cfeb5756fffea920acf40af003c0
|
|
a5cec12 Don't show empty tag stats for unprivileged uids
Linux version 3.10.73-ga5cec12 (android-build@vpak5.mtv.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Wed Jun 8 18:39:54 UTC 2016 (mdr-1.6)
Bug: 27532522
Bug: 27577101
Change-Id: Icf7793d412e155173ce693a92662d7b2dafd0002
Signed-off-by: Patrick Tjin <pattjin@google.com>
|
|
|
|
am: 374cb34b1c
* commit '374cb34b1ca2fc9cc57e7d922c789f4521e6689d':
angler: update prebuilt kernel
Change-Id: Ic1727b8c84ffa14182941a2c5fa830475f693ed6
|
|
39e4f93 net: wireless: bcmdhd: fix enqueue and dequeue of deferred work framework
Linux version 3.10.73-g39e4f93 (android-build@wpdu12.hot.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Wed Jun 1 02:48:28 UTC 2016 (master)
Bug: 28226991
Change-Id: Ibec35dcba6ce1a27ff98533778f7548dc162704a
Signed-off-by: Patrick Tjin <pattjin@google.com>
|
|
|
|
am: d93ca092e1
* commit 'd93ca092e18e0cba6603da888b7a2400c50273e6':
angler: update prebuilt kernel [DO NOT MERGE]
Change-Id: Ia47e13200f9d671099d0c53119a8099667935067
|
|
am: 28c91fba69 -s ours
* commit '28c91fba69b934f29f8c58c511ccb55146bbe485':
angler: update prebuilt kernel [DO NOT MERGE]
Change-Id: I9ab1955d70c423a8715000e9d044610a6290aa48
|
|
9a4100b net: wireless: bcmdhd: security enhancement for BRCM ether type [DO NOT MERRGE]
dae22e6 ASoC: msm: audio-effects: misc fixes in h/w effects (update)
484855e tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)
7b5d6c5 Replace %p with %pK to prevent leaking kernel address
5893a20 ASoC: msm: audio-effects: misc fixes in h/w accelerated effect
66ddfb4 msm: perf: Do not allocate new hw_event if event is duplicate.
28d6c94 msm: kgsl: Avoid race condition in ioctl_syncsource_destroy
58689c1 USB: fix invalid memory access in hub_activate()
1b732b2 USB: dwc3: debugfs: Add boundary check in dwc3_store_ep_num()
1356eca msm: camera: sensor: Validate step_boundary
0bd440b Revert "arm64: Introduce execute-only page access permissions"
2907670 msm: kgsl: verify user memory permissions before mapping to GPU driver
a8d50ea mdss: mdp3: Validate input from userspace
b51f9e6 Revert "mdss: mdp3: Validate input from userspace"
d976225 AIO: properly check iovec sizes
1e58f42 usb: f_serial: Check for SMD data length in GSER_IOCTL
22b1e9f mdss: mdp3: Validate input from userspace
de8646e angler_defconfig: disable CONFIG_PFT as it is unsupported
33cce58 spi-contexthub: fix heap overflow vulnerability
Bug: 26492805
Bug: 27532522
Bug: 27657963
Bug: 27890772
Bug: 28084795
Bug: 28172137
Bug: 28172322
Bug: 28305757
Bug: 28402196
Bug: 28409131
Bug: 28470967
Bug: 28557020
Bug: 28588279
Bug: 28588434
Bug: 28602014
Bug: 28712303
Linux version 3.10.73-g9a4100b (android-build@kpfi14.cbf.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) ) #1 SMP
PREEMPT Thu May 26 18:34:24 UTC 2016 (mdr-1.6)
Change-Id: I8c4e5c5f004dbfbfcb162d6a5095a712efd737f9
Signed-off-by: Patrick Tjin <pattjin@google.com>
|
|
am: 56bf529d53
* commit '56bf529d53ef2dbc0e5e72027fee325ac3294228':
angler: update prebuilt kernel
Change-Id: I0567dccb562f1ca2890469627c75755673f6f084
|
|
d4852d1 enable fstack-protector-strong
c45d1ce msm_thermal: send OFF/ONLINE uevent in hotplug cases
d188f48 Don't show empty tag stats for unprivileged uids
39c9be7 msm: mdss: Don't wait for idle before performing persistence changes
a805a3e1 arm64/dts: angler: Don't blank screen when leaving low persistence mode
94635b3 Revert "arch: arm64: disable hardware breakpoints"
2b4ac61 USB: fix invalid memory access in hub_activate()
7e55f15 mdss: mdp3: Validate input from userspace
8589791 Revert "mdss: mdp3: Validate input from userspace"
Linux version 3.10.73-gd4852d1 (android-build@vpbs28.mtv.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Thu May 26 07:10:44 UTC 2016
Bug: 27532522
Bug: 27577101
Bug: 27795100
Bug: 28111472
Bug: 28602014
Bug: 28712303
Bug: 28837708
Bug: 28887345
Bug: 28911793
Change-Id: I4b0e8a6c53ea54722032137a1c7076c81ab53bd2
Signed-off-by: Thierry Strudel <tstrudel@google.com>
|
|
|
|
am: 3d917dc140
* commit '3d917dc1400682eb55e7acfc0dac3e20e88c5422':
angler: update prebuilt kernel
Change-Id: I65c8b4cea714f5391e99e7f568a03a9a5027448f
|
|
247617b Revert "net: wireless: bcmdhd: add support for runtime pm"
4f89c38 Revert "net: wireless: bcmdhd: control NETIF queue in runtimePM"
a90a916 Revert "net: wireless: bcmdhd: add runtimePM suspend in power-off routine"
ec2e23d Revert "net: wireless: bcmdhd: separate rx and tx to different workqueue"
09aec43 net: wireless: bcmdhd: deregister address notifier callback on interface down
0ff00c5 net: wireless: bcmdhd: use readlock_bh() in inet6 address notifier callback
bb5f128 angler_defconfig: disable CONFIG_PFT as it is unsupported
98a964b ASoC: msm: qdsp6v2: Fix offload gapless transition
3a8f2ce nanohub: increase wakeup sensor sample wakelock from 10ms to 250ms
5066268 net: wireless: bcmdhd: separate rx and tx to different workqueue
0cd0485 mdss: mdp3: Validate input from userspace
1e7fc02 Revert "net: wireless: bcmdhd: removing wake_locks based on runtimePM"
2cb8161 net: wireless: bcmdhd: add runtimePM suspend in power-off routine
81b7478 Revert "Revert "net: wireless: bcmdhd: control NETIF queue in runtimePM""
b30e3e9 Revert "Revert "net: wireless: bcmdhd: fix multiple target RTT failure while associated""
5089d9c Revert "Revert "net: wireless: bcmdhd: removing wake_locks based on runtimePM""
ededc8e Revert "Revert "net: wireless: bcmdhd: fix bitmask set issue in event logging""
620e724 Revert "Revert "net: wireless: bcmdhd: add support for runtime pm""
Linux version 3.10.73-g247617b (android-build@wpee6.hot.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Tue May 17 23:17:38 UTC 2016
Bug: 28470911
Bug: 28545177
Bug: 28588434
Bug: 28602014
Bug: 28681161
Bug: 28708251
Bug: 28759940
Change-Id: Iea4598b7af6b4bcd2bf749ce2039a43957710ce1
Signed-off-by: Gilad Avidov <giladavidov@google.com>
|
|
|
|
am: 7e130ad5d8
* commit '7e130ad5d8b22f6b780d2c861277f085a2f784d5':
angler: update prebuilt kernel
Change-Id: Ia89569d4edcd2810ba5a347c57b63a72253a97d4
|
|
Go back in history to remove the Wifi RPM b/28759421
0fa8ce2 Revert "net: wireless: bcmdhd: removing wake_locks based on runtimePM"
4e768a6 Revert "net: wireless: bcmdhd: add support for runtime pm"
a66f17e Revert "net: wireless: bcmdhd: fix bitmask set issue in event logging"
894c73a Revert "net: wireless: bcmdhd: removing wake_locks based on runtimePM"
7d0a541 Revert "net: wireless: bcmdhd: fix multiple target RTT failure while associated"
2b11ea2 Revert "net: wireless: bcmdhd: control NETIF queue in runtimePM"
be9c23d angler_defconfig: disable NF_TARGET_REJECT_SKERR
776e3d1 net: wireless: bcmdhd: control NETIF queue in runtimePM
3a11509 net: wireless: bcmdhd: fix multiple target RTT failure while associated
1a224c9 net: wireless: bcmdhd: removing wake_locks based on runtimePM
e94b5ba net: wireless: bcmdhd: fix bitmask set issue in event logging
357e395 net: wireless: bcmdhd: add support for runtime pm
Linux version 3.10.73-g0fa8ce2 (android-build@vpeh12.mtv.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Wed May 11 20:40:27 UTC 2016
Bug: 28759421
Change-Id: Ie1e9d1a6afcc4344c4cd316a4b26135a0ba64911
Signed-off-by: Thierry Strudel <tstrudel@google.com>
# Conflicts:
# Image.gz-dtb
|
|
1e7fc02 Revert "net: wireless: bcmdhd: removing wake_locks based on runtimePM"
2cb8161 net: wireless: bcmdhd: add runtimePM suspend in power-off routine
81b7478 Revert "Revert "net: wireless: bcmdhd: control NETIF queue in runtimePM""
b30e3e9 Revert "Revert "net: wireless: bcmdhd: fix multiple target RTT failure while associated""
5089d9c Revert "Revert "net: wireless: bcmdhd: removing wake_locks based on runtimePM""
ededc8e Revert "Revert "net: wireless: bcmdhd: fix bitmask set issue in event logging""
620e724 Revert "Revert "net: wireless: bcmdhd: add support for runtime pm""
0fa8ce2 Revert "net: wireless: bcmdhd: removing wake_locks based on runtimePM"
4e768a6 Revert "net: wireless: bcmdhd: add support for runtime pm"
a66f17e Revert "net: wireless: bcmdhd: fix bitmask set issue in event logging"
894c73a Revert "net: wireless: bcmdhd: removing wake_locks based on runtimePM"
7d0a541 Revert "net: wireless: bcmdhd: fix multiple target RTT failure while associated"
2b11ea2 Revert "net: wireless: bcmdhd: control NETIF queue in runtimePM"
Linux version 3.10.73-g1e7fc02 (android-build@wpdv7.hot.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Thu May 12 18:24:04 UTC 2016
Bug: 28681161
Change-Id: Ia63acd99337d5b3d9eca29d9b73f0fa9df24784b
Signed-off-by: Gilad Avidov <giladavidov@google.com>
|
|
am: 0db8862198
* commit '0db88621984bbe213dadfca2b4e457d68331edfe':
angler: update prebuilt kernel
Change-Id: I5c3cd3fd6ae55e95eb80269a3d38bf76656207a3
|
|
1e7fc02 Revert "net: wireless: bcmdhd: removing wake_locks based on runtimePM"
2cb8161 net: wireless: bcmdhd: add runtimePM suspend in power-off routine
81b7478 Revert "Revert "net: wireless: bcmdhd: control NETIF queue in runtimePM""
b30e3e9 Revert "Revert "net: wireless: bcmdhd: fix multiple target RTT failure while associated""
5089d9c Revert "Revert "net: wireless: bcmdhd: removing wake_locks based on runtimePM""
ededc8e Revert "Revert "net: wireless: bcmdhd: fix bitmask set issue in event logging""
620e724 Revert "Revert "net: wireless: bcmdhd: add support for runtime pm""
0fa8ce2 Revert "net: wireless: bcmdhd: removing wake_locks based on runtimePM"
4e768a6 Revert "net: wireless: bcmdhd: add support for runtime pm"
a66f17e Revert "net: wireless: bcmdhd: fix bitmask set issue in event logging"
894c73a Revert "net: wireless: bcmdhd: removing wake_locks based on runtimePM"
7d0a541 Revert "net: wireless: bcmdhd: fix multiple target RTT failure while associated"
2b11ea2 Revert "net: wireless: bcmdhd: control NETIF queue in runtimePM"
Linux version 3.10.73-g1e7fc02 (android-build@wpdv7.hot.corp.google.com)
(gcc version 4.9.x-google 20140827 (prerelease) (GCC) )
#1 SMP PREEMPT Thu May 12 18:24:04 UTC 2016
Bug: 28681161
Change-Id: Ia63acd99337d5b3d9eca29d9b73f0fa9df24784b
Signed-off-by: Gilad Avidov <giladavidov@google.com>
|