Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- a436d9c6b9c2 ebiggers@google.com UPSTREAM: crypto: pcrypt - fix freeing pcrypt instances
- 1d54552e0f08 ebiederm@xmission.com net: Fix double free and memory corruption in get_net_ns_by_id()
- 8826b79ff91a fengc@google.com ANDROID: qtaguid: Fix the UAF probelm with tag_ref_tree
- dbfb10a3c62e viktors@google.com staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl
- 778d1640dff5 ebiggers@google.com KEYS: add missing permission check for request_key() destination
- 06ff311ef6bd tiwai@suse.de ALSA: seq: Fix use-after-free at creating a port
- ffd26e118ccc kirill.shutemov@linux.intel.com mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
- 9b09034aa436 herbert@gondor.apana.org.au ipsec: Fix aborted xfrm policy dump crash
- f734c0dc4566 tom@herbertland.com netlink: add a start callback for starting a netlink dump
- 161a50221832 cernekee@chromium.org netlink: Add netns check on taps
- a05ef57d4963 stern@rowland.harvard.edu USB: core: prevent malicious bNumInterfaces overflow
- c27a6f7f9e4a ebiggers@google.com crypto: hmac - require that the underlying hash algorithm is unkeyed
- 11ee74346c3e nstange@suse.de PCI: Fix race condition with driver_override
- 1a6615e4a95d drosen@google.com ANDROID: mnt: Fix freeing of mount data
- 44dd109e5987 chris.redpath@arm.com ANDROID: sched/fair: Select correct capacity state for energy_diff
- 554843b57de8 sherryy@android.com FROMLIST: android: binder: Fix null ptr dereference in debug msg
- 891185ce2d45 sherryy@android.com FROMLIST: android: binder: Move buffer out of area shared with user space
- 8eeb4f364d50 sherryy@android.com FROMLIST: android: binder: Add allocator selftest
- b5bb59c3397e sherryy@android.com FROMLIST: android: binder: Refactor prev and next buffer into a helper function
- b3ac0defe30f xuyiping@hisilicon.com FROMLIST: binder: fix an ret value override
- 4ecc4c767b26 xuyiping@hisilicon.com FROMLIST: binder: fix memory corruption in binder_transaction binder
- 14a42657da62 surenb@google.com ANDROID: check dir value of xfrm_userpolicy_id
- 3f4427d43b3b surenb@google.com ANDROID: NFC: Fix possible memory corruption when handling SHDLC I-Frame commands
- 723c3e0fec28 surenb@google.com ANDROID: nfc: fdp: Fix possible buffer overflow in WCS4000 NFC driver
- eb4610b97943 surenb@google.com ANDROID: NFC: st21nfca: Fix out of bounds kernel access when handling ATR_REQ
- 8e7cf0b11e31 John.Youn@synopsys.com UPSTREAM: usb: dwc3: gadget: don't send extra ZLP
- 9e6afd4e3684 balbi@ti.com BACKPORT: usb: dwc3: gadget: handle request->zero
- 967ca3024565 Badhri@google.com ANDROID: usb: gadget: assign no-op request complete callbacks
- 1f3f566d9b41 danilokrummrich@gmail.com ANDROID: usb: gadget: configfs: fix null ptr in android_disconnect
- ad0af9b183c7 amit.pundir@linaro.org ANDROID: uid_sys_stats: Fix implicit declaration of get_cmdline()
- c5c3d46ccc5d yajin@google.com uid_sys_stats: log task io with a debug flag
- 623f33f213de fengc@google.com ANDROID: Use sk_uid to replace uid get from socket file
- 107c1d57f89d amit.pundir@linaro.org ANDROID: arm64: Fix a copy-paste error in prior init_thread_info build fix
- 286f536cbfe0 torvalds@linux-foundation.org UPSTREAM: locking: avoid passing around 'thread_info' in mutex debugging code
- e991aa38ea38 amit.pundir@linaro.org ANDROID: arm64: fix undeclared 'init_thread_info' error
- c932c1b77304 luto@kernel.org UPSTREAM: kdb: use task_cpu() instead of task_thread_info()->cpu
- 60366263e6ae srmohan@google.com ANDROID: keychord: Fix for a memory leak in keychord.
- 462acca2816e srmohan@google.com ANDROID: keychord: Fix races in keychord_write.
- dd5826152c53 srmohan@google.com Use %zu to print resid (size_t).
- eac37ad2df7e srmohan@google.com ANDROID: keychord: Fix a slab out-of-bounds read.
- 6f227409a179 maco@android.com ANDROID: binder: don't queue async transactions to thread.
- c825eca5ec45 maco@android.com ANDROID: binder: don't enqueue death notifications to thread todo.
- 4d666b500c2d maco@android.com ANDROID: binder: call poll_wait() unconditionally.
- b1c79e32b7a8 smuckle@google.com android: configs: move quota-related configs to recommended
- a960dbced9c6 oleg@redhat.com UPSTREAM: kthread: Pin the stack via try_get_task_stack()/put_task_stack() in to_live_kthread() function
- 99cf9fa9a006 luto@kernel.org UPSTREAM: sched/core: Add try_get_task_stack() and put_task_stack()
- 8bc69d462ad3 luto@kernel.org UPSTREAM: sched/core: Allow putting thread_info into task_struct
- 242f841e5485 luto@kernel.org UPSTREAM: printk: when dumping regs, show the stack, not thread_info
- f707c0f98f32 torvalds@linux-foundation.org UPSTREAM: fix up initial thread stack pointer vs thread_info confusion
- 50d3f7d55a4f torvalds@linux-foundation.org UPSTREAM: Clarify naming of thread info/stack allocators
- b315101a358f jaegeuk@google.com ANDROID: sdcardfs: override credential for ioctl to lower fs
- 7eeebce62c21 maco@android.com ANDROID: binder: Don't BUG_ON(!spin_is_locked()).
- 2e13f308a985 chris.redpath@arm.com sched/fair: Add a backup_cpu to find_best_target
- 6cb8fcccb26e chris.redpath@arm.com sched/fair: Try to estimate possible idle states.
- d96e40472807 brendan.jackman@arm.com sched/fair: Sync task util before EAS wakeup
- e76348ec5f7f brendan.jackman@arm.com Revert "sched/fair: ensure utilization signals are synchronized before use"
- ebc28671a5a3 leo.yan@linaro.org sched/fair: kick nohz idle balance for misfit task
- 7b63e1ff5213 chris.redpath@arm.com sched/fair: Update signals of nohz cpus if we are going idle
- bf6cd4d156b7 patrick.bellasi@arm.com events: add tracepoint for find_best_target
- 5680f23f20c7 patrick.bellasi@arm.com sched/fair: streamline find_best_target heuristics
- 3715386152f1 herbert@gondor.apana.org.au UPSTREAM: af_key: Fix sadb_x_ipsecrequest parsing
- ca2ecff8649e joelaf@google.com ANDROID: lowmemorykiller: Add tgid to kill message
- 362e08d2572f danielmentz@google.com Revert "proc: smaps: Allow smaps access for CAP_SYS_RESOURCE"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement