android_kernel_lge_bullhead/net/bluetooth/hidp
Nathan Chancellor 68bcf63600 Android 8.1.0 Release 0.62
-----BEGIN PGP SIGNATURE-----
 
 iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCWxWzwwAKCRDorT+BmrEO
 eEmGAJ9Y4YMBAgQmIsz5GjbvNk3Kqu3RGACdEcAsk2is8cSq1kKvF6Hmlappr3w=
 =pyl6
 -----END PGP SIGNATURE-----
gpgsig -----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCAAdFiEEJDfLduVEy2qz2d/TmXOSYMtstxYFAlsVt6IACgkQmXOSYMts
 txaWWg//bg+TS8zJixr4WwRjFL/eMLtLVKViMQX5p7ZEaaKZzzV178fG/yICUEGa
 TIDjR9RIFU2P17y7NJCN/Jwn3qSNgf1gxuSSUboNAPYUK3L9qFIGTmUZHGQ0nGMc
 q6eVO+leIF38+aePzD6utysAzrCO3rd7MKFyHaukQUVX0z46ObUZYUkNlxcalVfL
 /+8rzUOX5JnuD0iUaU1LwgxY/Kox2IDkmJCiI1mnexUGJ7fCDOZN5HLG+7bsRw2r
 +YiKzzOqsoAIiXNlZOL7K4fnB3kt0pslcsv4apt75547xqSl1guVM3qUOLhvgpKL
 yn2C0DLwi7QP5WOJjiyT7dNlmRBE1d5X/cWZZGffUbhMMcvFDxXO9yXmI9cS2nB9
 2tfhlvEjf4COtmoai/5LwsyoLfJn+gtiAzQ2J7D+/FqMSYcF4p+cj0nKNNu5+aN7
 od5RFOnodKIeGoGf6XJcPQtOZnCu+TpUe+xMaACTnolT/xHlcyCV5xCL+E6waNg5
 0mGCOEOyXM3+LlFul8o++dd8UFDQr83Sq9VJ+S6flKIM/ShIle9bxvsO3TSu9Uy/
 QlmP9/NBdnLmPqdabauq1HNINpQAFAnPFtP8MqHYGEdZczpAGf9ihJWFtAEPRWSw
 /KoFtUWCMsvFMnIz3EDAr2i3afb2/vE1seQc/X44uErwqsng8M8=
 =PN63
 -----END PGP SIGNATURE-----

Merge tag 'android-8.1.0_r0.62' into android-msm-bullhead-3.10

Android 8.1.0 Release 0.62

* tag 'android-8.1.0_r0.62':
  Revert "ion: ensure CMO target is valid"
  msm: ADSPRPC: Use ID in response to get context pointer
  qcacld-2.0: Fix potential buffer overwrite in the htt_t2h_lp_msg_handler
  qcacld-2.0: Add data_len check to avoid OOB access
  BACKPORT: ASN.1: fix out-of-bounds read when parsing indefinite length item
  UPSTREAM: KEYS: fix out-of-bounds read during ASN.1 parsing
  qcacld-2.0: Fix potential buffer overflow
  ion: ensure CMO target is valid
  crypto: hmac - require that the underlying hash algorithm is unkeyed
  qcacld-2.0: Move NBUF_UPDATE_TX_PKT_COUNT before freeing netbuf
  diag: dci: check signed values for negativity
  diag: Add conditional check for len in dci_process_ctrl_status()
  diag: Validate copying length against source buffer length
  mm-camera2:isp2: Handle use after free buffer
  ANDROID: Bluetooth: hidp: buffer overflow in hidp_process_report
  UPSTREAM: HID: Bluetooth: hidp: make sure input buffers are big enough
  qcacld-2.0: Remove FW memory dump feature
  BACKPORT: ipv6: fix udpv6 sendmsg crash caused by too small MTU
  UPSTREAM: ipv4, ipv6: ensure raw socket message is big enough to hold an IP header
  msm: ADSPRPC: use access_ok to validate pointers
  ASoC: wcd_cpe_core: Add mutex lock for CPE session

Signed-off-by: Nathan Chancellor <natechancellor@gmail.com>
2018-06-04 15:05:19 -07:00
..
Kconfig HID: Fix the generic Kconfig options 2012-06-25 17:25:00 +02:00
Makefile
core.c Android 8.1.0 Release 0.62 2018-06-04 15:05:19 -07:00
hidp.h UPSTREAM: HID: Bluetooth: hidp: make sure input buffers are big enough 2018-04-16 17:44:57 +00:00
sock.c Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs 2013-05-01 17:51:54 -07:00