Advertisement
arter97

Untitled

Feb 21st, 2018
889
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.77 KB | None | 0 0
  1. a436d9c6b9c2 ebiggers@google.com UPSTREAM: crypto: pcrypt - fix freeing pcrypt instances
  2. 1d54552e0f08 ebiederm@xmission.com net: Fix double free and memory corruption in get_net_ns_by_id()
  3. 8826b79ff91a fengc@google.com ANDROID: qtaguid: Fix the UAF probelm with tag_ref_tree
  4. dbfb10a3c62e viktors@google.com staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl
  5. 778d1640dff5 ebiggers@google.com KEYS: add missing permission check for request_key() destination
  6. 06ff311ef6bd tiwai@suse.de ALSA: seq: Fix use-after-free at creating a port
  7. ffd26e118ccc kirill.shutemov@linux.intel.com mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
  8. 9b09034aa436 herbert@gondor.apana.org.au ipsec: Fix aborted xfrm policy dump crash
  9. f734c0dc4566 tom@herbertland.com netlink: add a start callback for starting a netlink dump
  10. 161a50221832 cernekee@chromium.org netlink: Add netns check on taps
  11. a05ef57d4963 stern@rowland.harvard.edu USB: core: prevent malicious bNumInterfaces overflow
  12. c27a6f7f9e4a ebiggers@google.com crypto: hmac - require that the underlying hash algorithm is unkeyed
  13. 11ee74346c3e nstange@suse.de PCI: Fix race condition with driver_override
  14. 1a6615e4a95d drosen@google.com ANDROID: mnt: Fix freeing of mount data
  15. 44dd109e5987 chris.redpath@arm.com ANDROID: sched/fair: Select correct capacity state for energy_diff
  16. 554843b57de8 sherryy@android.com FROMLIST: android: binder: Fix null ptr dereference in debug msg
  17. 891185ce2d45 sherryy@android.com FROMLIST: android: binder: Move buffer out of area shared with user space
  18. 8eeb4f364d50 sherryy@android.com FROMLIST: android: binder: Add allocator selftest
  19. b5bb59c3397e sherryy@android.com FROMLIST: android: binder: Refactor prev and next buffer into a helper function
  20. b3ac0defe30f xuyiping@hisilicon.com FROMLIST: binder: fix an ret value override
  21. 4ecc4c767b26 xuyiping@hisilicon.com FROMLIST: binder: fix memory corruption in binder_transaction binder
  22. 14a42657da62 surenb@google.com ANDROID: check dir value of xfrm_userpolicy_id
  23. 3f4427d43b3b surenb@google.com ANDROID: NFC: Fix possible memory corruption when handling SHDLC I-Frame commands
  24. 723c3e0fec28 surenb@google.com ANDROID: nfc: fdp: Fix possible buffer overflow in WCS4000 NFC driver
  25. eb4610b97943 surenb@google.com ANDROID: NFC: st21nfca: Fix out of bounds kernel access when handling ATR_REQ
  26. 8e7cf0b11e31 John.Youn@synopsys.com UPSTREAM: usb: dwc3: gadget: don't send extra ZLP
  27. 9e6afd4e3684 balbi@ti.com BACKPORT: usb: dwc3: gadget: handle request->zero
  28. 967ca3024565 Badhri@google.com ANDROID: usb: gadget: assign no-op request complete callbacks
  29. 1f3f566d9b41 danilokrummrich@gmail.com ANDROID: usb: gadget: configfs: fix null ptr in android_disconnect
  30. ad0af9b183c7 amit.pundir@linaro.org ANDROID: uid_sys_stats: Fix implicit declaration of get_cmdline()
  31. c5c3d46ccc5d yajin@google.com uid_sys_stats: log task io with a debug flag
  32. 623f33f213de fengc@google.com ANDROID: Use sk_uid to replace uid get from socket file
  33. 107c1d57f89d amit.pundir@linaro.org ANDROID: arm64: Fix a copy-paste error in prior init_thread_info build fix
  34. 286f536cbfe0 torvalds@linux-foundation.org UPSTREAM: locking: avoid passing around 'thread_info' in mutex debugging code
  35. e991aa38ea38 amit.pundir@linaro.org ANDROID: arm64: fix undeclared 'init_thread_info' error
  36. c932c1b77304 luto@kernel.org UPSTREAM: kdb: use task_cpu() instead of task_thread_info()->cpu
  37. 60366263e6ae srmohan@google.com ANDROID: keychord: Fix for a memory leak in keychord.
  38. 462acca2816e srmohan@google.com ANDROID: keychord: Fix races in keychord_write.
  39. dd5826152c53 srmohan@google.com Use %zu to print resid (size_t).
  40. eac37ad2df7e srmohan@google.com ANDROID: keychord: Fix a slab out-of-bounds read.
  41. 6f227409a179 maco@android.com ANDROID: binder: don't queue async transactions to thread.
  42. c825eca5ec45 maco@android.com ANDROID: binder: don't enqueue death notifications to thread todo.
  43. 4d666b500c2d maco@android.com ANDROID: binder: call poll_wait() unconditionally.
  44. b1c79e32b7a8 smuckle@google.com android: configs: move quota-related configs to recommended
  45. a960dbced9c6 oleg@redhat.com UPSTREAM: kthread: Pin the stack via try_get_task_stack()/put_task_stack() in to_live_kthread() function
  46. 99cf9fa9a006 luto@kernel.org UPSTREAM: sched/core: Add try_get_task_stack() and put_task_stack()
  47. 8bc69d462ad3 luto@kernel.org UPSTREAM: sched/core: Allow putting thread_info into task_struct
  48. 242f841e5485 luto@kernel.org UPSTREAM: printk: when dumping regs, show the stack, not thread_info
  49. f707c0f98f32 torvalds@linux-foundation.org UPSTREAM: fix up initial thread stack pointer vs thread_info confusion
  50. 50d3f7d55a4f torvalds@linux-foundation.org UPSTREAM: Clarify naming of thread info/stack allocators
  51. b315101a358f jaegeuk@google.com ANDROID: sdcardfs: override credential for ioctl to lower fs
  52. 7eeebce62c21 maco@android.com ANDROID: binder: Don't BUG_ON(!spin_is_locked()).
  53. 2e13f308a985 chris.redpath@arm.com sched/fair: Add a backup_cpu to find_best_target
  54. 6cb8fcccb26e chris.redpath@arm.com sched/fair: Try to estimate possible idle states.
  55. d96e40472807 brendan.jackman@arm.com sched/fair: Sync task util before EAS wakeup
  56. e76348ec5f7f brendan.jackman@arm.com Revert "sched/fair: ensure utilization signals are synchronized before use"
  57. ebc28671a5a3 leo.yan@linaro.org sched/fair: kick nohz idle balance for misfit task
  58. 7b63e1ff5213 chris.redpath@arm.com sched/fair: Update signals of nohz cpus if we are going idle
  59. bf6cd4d156b7 patrick.bellasi@arm.com events: add tracepoint for find_best_target
  60. 5680f23f20c7 patrick.bellasi@arm.com sched/fair: streamline find_best_target heuristics
  61. 3715386152f1 herbert@gondor.apana.org.au UPSTREAM: af_key: Fix sadb_x_ipsecrequest parsing
  62. ca2ecff8649e joelaf@google.com ANDROID: lowmemorykiller: Add tgid to kill message
  63. 362e08d2572f danielmentz@google.com Revert "proc: smaps: Allow smaps access for CAP_SYS_RESOURCE"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement