android_kernel_lge_bullhead/net/packet
Nathan Chancellor 2505872e8e Android 8.1.0 Release 0.36 (OPM5.171019.017,angler)
-----BEGIN PGP SIGNATURE-----
 
 iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCWp3GSgAKCRDorT+BmrEO
 eH+BAJ0Z1NF9Qsc8eCHx2GPuLc9Oh4BiuwCeIRJt6qJwTgqwGhBrzLEy4WtvR18=
 =Rbhg
 -----END PGP SIGNATURE-----
gpgsig -----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCAAdFiEEJDfLduVEy2qz2d/TmXOSYMtstxYFAlqd0TEACgkQmXOSYMts
 txYuSg/+Nz5WSONRPD1P5fJds0JPlQaT4UUxwJy0QJJQwQLzKdhBObLjZHI07Kwg
 wVaJ0QjFd2TP5RGqBI4ACreePkpLZLtY0fNlMFrqJAczU+SCyjrR8jEpwLESFa0W
 Uy83dc7+8nNPYo4A2WHW596paXkkf/zzexIYvc0KPBbqbR1MEHxl2M9WQ1FpbDtX
 ebzlhPGHxP99n6R2DYFU4Fh4bp1XXP5i0Yp+083HXobkU8L9svdouyGzN3DaC/gh
 oy3LS/QOh80V60nl+QuMtlrv2WmGycaWypa5PkYVJO80HVxzJV6Wmw9nioBghgVB
 h6kv5UuJRMH6MqUSdqc9WVfeA1ndDwFPdrYn8xuroljKWOBdz7UInblYoT4U2kpR
 oYy822xKssqPEyVP48pFP+iN2LwOc7Qr/W5dYRRkg0uTooZWzDhrpvvVgPaddpvU
 sKLrI4z2Z4y3/fJJ1BynpL046H4UHFDA7/9m4ehIwK8eX+/QCSi6gEvEtZcU+k+F
 czGVR843MKpbcDztGnyw+ml7K2hajkC394syAaLQs+pq/1CUkQ2JoRbukmladTIS
 4A7OnSr4Q3kHaZnoV1axvtzCRNkUr3f5VeOMA6IrYSw9dsGGWQ78fy7mp/BgJbcI
 Fpt7iRDzIy813oegQz4D9AQ3bqIbBBvWQ3uvRr4EUz1WLYQ+jc0=
 =AhfL
 -----END PGP SIGNATURE-----

Merge tag 'android-8.1.0_r0.37' into android-msm-bullhead-3.10-oreo-m5

Android 8.1.0 Release 0.36 (OPM5.171019.017,angler)

* tag 'android-8.1.0_r0.37':
  qcacld-2.0: Add sanity check to limit mgmt frames data len
  qcacld-2.0: Set length of challenge text sent by SAP to 128
  BACKPORT: packet: in packet_do_bind, test fanout with bind_lock held
  qcacld-2.0: Avoid OEM message overread
  msm: sensor: flash: add conditional check for ioctl
  msm:ipa: Fix to incorrect structure access
  ASoC: msm: qdsp6v2: Set freed pointers to NULL
  UPSTREAM: packet: fix tp_reserve race in packet_set_ring
  diag: Add protection while de-initializing clients
  qcacld-2.0: Fix out-of-bounds access in limProcessActionFrameNoSession
  qcacld-2.0: Check for upper bound in P2P NOA event
  qcacld-2.0: Check for the max number of P2P NOA descriptors
  qcacld-2.0: Check for valid vdev ID in wma_nlo_match_evt_handler
  qcacld-2.0: Avoid possible buffer overwrite in wma_process_utf_event
  UPSTREAM: USB: serial: console: fix use-after-free after failed setup
  UPSTREAM: ALSA: usb-audio: Kill stray URB at exiting
  UPSTREAM: ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor
  UPSTREAM: USB: fix out-of-bounds in usb_set_configuration
  UPSTREAM: HID: usbhid: fix out-of-bounds bug
  UPSTREAM: USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()
  UPSTREAM: packet: hold bind lock when rebinding to fanout hook
  power: qcom: msm-core: Add mutex lock for ioctl
  qcacld-2.0: Fix int overflow in wma_unified_link_peer_stats_event_handler
  qcacld-2.0: Check vdev_id against wma->max_bssid
  FROMLIST: power: Fix user ptr in EA_LEAKAGE ioctl
  diag: Add mutex protection while reading dci debug statistics
  qcacld-2.0: Fix Integer overflow with latest framesc_linux tool
  qcacld-2.0: Avoid integer overflow in lim_update_ibss_prop_add_ies
  qcacld-2.0: Fix the size of array ch_list in sme_set_plm_request
  ANDROID: sdcardfs: Add default_normal option
  ANDROID: sdcardfs: notify lower file of opens

Signed-off-by: Nathan Chancellor <natechancellor@gmail.com>
2018-03-05 16:22:23 -07:00
..
Kconfig packet: Diag core and basic socket info dumping 2012-08-14 16:56:33 -07:00
Makefile packet: Diag core and basic socket info dumping 2012-08-14 16:56:33 -07:00
af_packet.c Android 8.1.0 Release 0.36 (OPM5.171019.017,angler) 2018-03-05 16:22:23 -07:00
diag.c net: Use netlink_ns_capable to verify the permisions of netlink messages 2014-06-26 15:12:37 -04:00
internal.h packet: handle too big packets for PACKET_V3 2014-10-15 08:31:56 +02:00