<feed xmlns='http://www.w3.org/2005/Atom'>
<title>xavi/android_kernel_m2note/drivers/misc/mediatek/connectivity/wlan, branch ng-7.1.2</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2</id>
<link rel='self' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2'/>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/'/>
<updated>2019-07-20T11:05:20+00:00</updated>
<entry>
<title>(CR) ALPS03957020(For_mt6737m_35_n1_alps-mp-n1.mp1-V1_P118)</title>
<updated>2019-07-20T11:05:20+00:00</updated>
<author>
<name>lingsen1</name>
<email>lingsen1@lenovo.com</email>
</author>
<published>2018-06-05T06:07:01+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=12cf6bd4b583fca525beb8597fae027e9e9a7cdf'/>
<id>urn:sha1:12cf6bd4b583fca525beb8597fae027e9e9a7cdf</id>
<content type='text'>
Patch Type:
  Customer Request
CR ID:
  ALPS03957020
Severity:

Description:
  [Patch Request] [PMS] mt, Project: mt6737M_35_N1, SW Version: alps-mp-n1.mp1-V1N/A

Associated Files:
  device/mt/mt6737m_35_n1/ProjectConfig.mk

Patch Type:
  Customer Request
CR ID:
  ALPS03913671
Severity:
  Critical
Description:
  [Google Security P***h][CVE_2018_9369]EoP Vulnerability i***ootloader (Device Specific)
  [[Title fo***ustomer]]
  [Google Security P***h][CVE_2018_9369]EoP Vulnerability i***ootloader (Device Specific)
  [[Problem Description]]
  [Google Security P***h][CVE_2018_9369]EoP Vulnerability i***ootloader (Device Specific)
  [[Potential Impa*** of the solution]]
  None
  [[Modules to be verified after taking p***h]]
  None
  [[問題標題]]
  [Google Security P***h][CVE_2018_9369]EoP Vulnerability i***ootloader (Device Specific)
  [[問題現象]]
  [Google Security P***h][CVE_2018_9369]EoP Vulnerability i***ootloader (Device Specific)
  [[解法可能帶來的影響]]
  (請填寫於此行下方，並描述如果合入這個p***h可能會有什麼trade off的改變，如perfo******e降低、UI改變等等)
  None
  [[建議驗證模塊]]
  (請填寫於此行下方，並建議客戶合了此p***h後要驗證哪些module或feature)
  NoneN/A

Associated Files:
  vendor/mediatek/proprietary/bootable/bootloader/lk/app/mt_boot/fastboot.c

Patch Type:
  Customer Request
CR ID:
  ALPS03913728
Severity:
  Critical
Description:
  [Google Security P***h][CVE_2018_9394]EoP Vulnerability in P2P (Device Specific)
  [[Title fo***ustomer]]
  [Google Security P***h][CVE_2018_9394]EoP Vulnerability in P2P (Device Specific)
  [[Problem Description]]
  [Google Security P***h][CVE_2018_9394]EoP Vulnerability in P2P (Device Specific)
  [[Potential Impa*** of the solution]]
  None
  [[Modules to be verified after taking p***h]]
  None
  [[問題標題]]
  [Google Security P***h][CVE_2018_9394]EoP Vulnerability in P2P (Device Specific)
  [[問題現象]]
  [Google Security P***h][CVE_2018_9394]EoP Vulnerability in P2P (Device Specific)
  [[解法可能帶來的影響]]
  (請填寫於此行下方，並描述如果合入這個p***h可能會有什麼trade off的改變，如perfo******e降低、UI改變等等)
  None
  [[建議驗證模塊]]
  (請填寫於此行下方，並建議客戶合了此p***h後要驗證哪些module或feature)
  NoneN/A

Associated Files:
  kernel-3.18/drivers/misc/mediatek/connectivity/wlan/gen2/os/linux/gl_p2p.c

Patch Type:
  Customer Request
CR ID:
  ALPS03913732
Severity:
  Critical
Description:
  [Google Security P***h][CVE_2018_9396]EoP Vulnerability in C*** (Device Specific)
  [[Title fo***ustomer]]
  [Google Security P***h][CVE_2018_9396]EoP Vulnerability in C*** (Device Specific)
  [[Problem Description]]
  [Google Security P***h][CVE_2018_9396]EoP Vulnerability in C*** (Device Specific)
  [[Potential Impa*** of the solution]]
  None
  [[Modules to be verified after taking p***h]]
  None
  [[問題標題]]
  [Google Security P***h][CVE_2018_9396]EoP Vulnerability in C*** (Device Specific)
  [[問題現象]]
  [Google Security P***h][CVE_2018_9396]EoP Vulnerability in C*** (Device Specific)
  [[解法可能帶來的影響]]
  (請填寫於此行下方，並描述如果合入這個p***h可能會有什麼trade off的改變，如perfo******e降低、UI改變等等)
  None
  [[建議驗證模塊]]
  (請填寫於此行下方，並建議客戶合了此p***h後要驗證哪些module或feature)
  NoneN/A

Associated Files:
  kernel-3.18/drivers/misc/mediatek/eccci/port_rpc.c

Patch Type:
  Customer Request
CR ID:
  ALPS03921114
Severity:
  Critical
Description:
  [IMS ***erface][version#0x68][AP] Added support fo***ountry-specific ur***o***o call response
  [[Title fo***ustomer]]
  IMS ***erface to support country-specific URN
  [[Problem Description]]
  Added support for IMS ***erface mo_call_c*** to country-specific URN which I***tack may send to MD side.
  [[Potential Impa*** of the solution]]
  Emergency call fun***ionality possible to implement as per ***PP and operator requirement.
  [[Modules to be verified after taking p***h]]
  VDM, VoLTE UA
  [[問題標題]]
  IMS ***erface to support country-specific URN
  [[問題現象]]
  Added support for IMS ***erface mo_call_c*** to country-specific URN which I***tack may send to MD side.
  [[解法可能帶來的影響]]
  (請填寫於此行下方，並描述如果合入這個p***h可能會有什麼trade off的改變，如perfo******e降低、UI改變等等)
  Emergency call fun***ionality possible to implement as per ***PP and operator requirement.
  [[建議驗證模塊]]
  (請填寫於此行下方，並建議客戶合了此p***h後要驗證哪些module或feature)
  VDM, VoLTE UAN/A

Associated Files:
  vendor/mt/libs/volte_imcb/arm/volte_imcb
  vendor/mt/libs/volte_stack/arm/volte_stack
  vendor/mt/libs/volte_ua/arm/volte_ua

Change-Id: I0b947e82a40c6d2f7f63069ea73023cd61056223
</content>
</entry>
<entry>
<title>(CR) ALPS03877842(For_mt6737m_35_n1_alps-mp-n1.mp1-V1_P113)</title>
<updated>2019-07-20T11:03:14+00:00</updated>
<author>
<name>lingsen1</name>
<email>lingsen1@lenovo.com</email>
</author>
<published>2018-04-25T08:52:28+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=09d9186d9ecface67bb121aebda7cdff67e76b15'/>
<id>urn:sha1:09d9186d9ecface67bb121aebda7cdff67e76b15</id>
<content type='text'>
Patch Type:
  Customer Request
CR ID:
  ALPS03877842
Severity:

Description:
  [Patch Request] [PMS] mt, Project: mt6737M_35_N1, SW Version: alps-mp-n1.mp1-V1N/A

Associated Files:
  device/mt/mt6737m_35_n1/ProjectConfig.mk
  vendor/mt/libs/libmtk-art-runtime/arm/libmtk-art-runtime.a

Patch Type:
  Customer Request
CR ID:
  ALPS03683903
Severity:
  Critical
Description:
  [Buganizer]Security Vulnerability Issue 70515752 - [An***d GO Pen***ing] Mediatek Preloader Allows Arbitrary Peripheral Memory Reads and Writes
  [[Title fo***ustomer]]
  [Buganizer]Security Vulnerability Issue 70515752 - [An***d GO Pen***ing] Mediatek Preloader Allows Arbitrary Peripheral Memory Reads and Writes
  [[Problem Description]]
  [Buganizer]Security Vulnerability Issue 70515752 - [An***d GO Pen***ing] Mediatek Preloader Allows Arbitrary Peripheral Memory Reads and Writes
  [[Potential Impa*** of the solution]]
  No
  [[Modules to be verified after taking p***h]]
  No
  [[問題標題]]
  [Buganizer]Security Vulnerability Issue 70515752 - [An***d GO Pen***ing] Mediatek Preloader Allows Arbitrary Peripheral Memory Reads and Writes
  [[問題現象]]
  [Buganizer]Security Vulnerability Issue 70515752 - [An***d GO Pen***ing] Mediatek Preloader Allows Arbitrary Peripheral Memory Reads and Writes
  [[解法可能帶來的影響]]
  (請填寫於此行下方，並描述如果合入這個p***h可能會有什麼trade off的改變，如perfo******e降低、UI改變等等)
  No
  [[建議驗證模塊]]
  (請填寫於此行下方，並建議客戶合了此p***h後要驗證哪些module或feature)
  NoN/A

Associated Files:
  vendor/mediatek/proprietary/bootable/bootloader/preloader/platform/mt6735/src/core/download.c
  vendor/mediatek/proprietary/bootable/bootloader/preloader/platform/mt6735/src/core/inc/download.h
  vendor/mediatek/proprietary/bootable/bootloader/preloader/platform/mt6735/src/drivers/inc/mt6735.h
  vendor/mediatek/proprietary/bootable/bootloader/preloader/platform/mt6735/src/security/inc/sec_region.h
  vendor/mediatek/proprietary/bootable/bootloader/preloader/platform/mt6735/src/security/sec_region.c

Patch Type:
  Customer Request
CR ID:
  ALPS03693488
Severity:
  Critical
Description:
  [Buganizer]Security Vulnerability Issue 70515281 - [An***d GO Pen***ing] Mediatek Preloader ¡§Download Mode¡¨ Memory Corruption
  [[Title fo***ustomer]]
  [Buganizer]Security Vulnerability Issue 70515281 - [An***d GO Pen***ing] Mediatek Preloader Download Mode Memory Corruption
  [[Problem Description]]
  [Buganizer]Security Vulnerability Issue 70515281 - [An***d GO Pen***ing] Mediatek Preloader Download Mode Memory Corruption
  [[Potential Impa*** of the solution]]
  no
  [[Modules to be verified after taking p***h]]
  boot
  [[問題標題]]
  [Buganizer]Security Vulnerability Issue 70515281 - [An***d GO Pen***ing] Mediatek Preloader Download Mode Memory Corruption
  [[問題現象]]
  [Buganizer]Security Vulnerability Issue 70515281 - [An***d GO Pen***ing] Mediatek Preloader Download Mode Memory Corruption
  [[解法可能帶來的影響]]
  (請填寫於此行下方，並描述如果合入這個p***h可能會有什麼trade off的改變，如perfo******e降低、UI改變等等)
  no
  [[建議驗證模塊]]
  (請填寫於此行下方，並建議客戶合了此p***h後要驗證哪些module或feature)
  bootN/A

Associated Files:
  vendor/mediatek/proprietary/bootable/bootloader/preloader/platform/mt6735/link_descriptor.ld
  vendor/mediatek/proprietary/bootable/bootloader/preloader/platform/mt6735/src/core/partition.c

Patch Type:
  Customer Request
CR ID:
  ALPS03740330
Severity:
  Critical
Description:
  [Buganizer]Security Vulnerability Issue 71867247 - [An***d GO Pen***ing] - Remo***emory Corruption in Mediatek WiFi TLDS Frame Parser
  [[Title fo***ustomer]]
  [Buganizer]Security Vulnerability Issue 71867247 - [An***d GO Pen***ing] - Remo***emory Corruption in Mediatek WiFi TLDS Frame Parser
  [[Problem Description]]
  [Buganizer]Security Vulnerability Issue 71867247 - [An***d GO Pen***ing] - Remo***emory Corruption in Mediatek WiFi TLDS Frame Parser
  [[Potential Impa*** of the solution]]
  None
  [[Modules to be verified after taking p***h]]
  None
  [[問題標題]]
  [Buganizer]Security Vulnerability Issue 71867247 - [An***d GO Pen***ing] - Remo***emory Corruption in Mediatek WiFi TLDS Frame Parser
  [[問題現象]]
  [Buganizer]Security Vulnerability Issue 71867247 - [An***d GO Pen***ing] - Remo***emory Corruption in Mediatek WiFi TLDS Frame Parser
  [[解法可能帶來的影響]]
  (請填寫於此行下方，並描述如果合入這個p***h可能會有什麼trade off的改變，如perfo******e降低、UI改變等等)
  None
  [[建議驗證模塊]]
  (請填寫於此行下方，並建議客戶合了此p***h後要驗證哪些module或feature)
  NoneN/A

Associated Files:
  kernel-3.18/drivers/misc/mediatek/connectivity/wlan/gen2/mgmt/tdls.c

Patch Type:
  Customer Request
CR ID:
  ALPS03862169
Severity:
  Critical
Description:
  [Google Security P***h][CVE_2017_13311]EoP Vulnerability in ProcessStats
  [[Title fo***ustomer]]
  [Google Security P***h][CVE_2017_13311]EoP Vulnerability in ProcessStats
  [[Problem Description]]
  [Google Security P***h][CVE_2017_13311]EoP Vulnerability in ProcessStats
  [[Potential Impa*** of the solution]]
  None
  [[Modules to be verified after taking p***h]]
  None
  [[問題標題]]
  [Google Security P***h][CVE_2017_13311]EoP Vulnerability in ProcessStats
  [[問題現象]]
  [Google Security P***h][CVE_2017_13311]EoP Vulnerability in ProcessStats
  [[解法可能帶來的影響]]
  (請填寫於此行下方，並描述如果合入這個p***h可能會有什麼trade off的改變，如perfo******e降低、UI改變等等)
  None
  [[建議驗證模塊]]
  (請填寫於此行下方，並建議客戶合了此p***h後要驗證哪些module或feature)
  NoneN/A

Associated Files:
  frameworks/base/core/java/com/android/internal/app/procstats/SparseMappingTable.java

Patch Type:
  Customer Request
CR ID:
  ALPS03862180
Severity:
  Critical
Description:
  [Google Security P***h][CVE_2017_13316]ID Vulnerability in Speech recognizer
  [[Title fo***ustomer]]
  [Google Security P***h][CVE_2017_13316]ID Vulnerability in Speech recognizer
  [[Problem Description]]
  [Google Security P***h][CVE_2017_13316]ID Vulnerability in Speech recognizer
  [[Potential Impa*** of the solution]]
  None
  [[Modules to be verified after taking p***h]]
  None
  [[問題標題]]
  [Google Security P***h][CVE_2017_13316]ID Vulnerability in Speech recognizer
  [[問題現象]]
  [Google Security P***h][CVE_2017_13316]ID Vulnerability in Speech recognizer
  [[解法可能帶來的影響]]
  (請填寫於此行下方，並描述如果合入這個p***h可能會有什麼trade off的改變，如perfo******e降低、UI改變等等)
  None
  [[建議驗證模塊]]
  (請填寫於此行下方，並建議客戶合了此p***h後要驗證哪些module或feature)
  NoneN/A

Associated Files:
  frameworks/base/core/java/android/content/PermissionChecker.java
  frameworks/base/core/java/android/speech/RecognitionService.java

Patch Type:
  Customer Request
CR ID:
  ALPS03862195
Severity:
  Critical
Description:
  [Google Security P***h][CVE_2017_13319]ID/DoS Vulnerability in MP3 codec
  [[Title fo***ustomer]]
  [Google Security P***h][CVE_2017_13319]ID/DoS Vulnerability in MP3 codec
  [[Problem Description]]
  [Google Security P***h][CVE_2017_13319]ID/DoS Vulnerability in MP3 codec
  [[Potential Impa*** of the solution]]
  None
  [[Modules to be verified after taking p***h]]
  None
  [[問題標題]]
  [Google Security P***h][CVE_2017_13319]ID/DoS Vulnerability in MP3 codec
  [[問題現象]]
  [Google Security P***h][CVE_2017_13319]ID/DoS Vulnerability in MP3 codec
  [[解法可能帶來的影響]]
  (請填寫於此行下方，並描述如果合入這個p***h可能會有什麼trade off的改變，如perfo******e降低、UI改變等等)
  None
  [[建議驗證模塊]]
  (請填寫於此行下方，並建議客戶合了此p***h後要驗證哪些module或feature)
  NoneN/A

Associated Files:
  frameworks/av/media/libstagefright/codecs/mp3dec/src/pvmp3_decode_header.cpp

Patch Type:
  Customer Request
CR ID:
  ALPS03862206
Severity:
  Critical
Description:
  [Google Security P***h][CVE_2017_16643]ID Vulnerability in USB driver (Device Specific)
  [[Title fo***ustomer]]
  [Google Security P***h][CVE_2017_16643]ID Vulnerability in USB driver (Device Specific)
  [[Problem Description]]
  [Google Security P***h][CVE_2017_16643]ID Vulnerability in USB driver (Device Specific)
  [[Potential Impa*** of the solution]]
  None
  [[Modules to be verified after taking p***h]]
  None
  [[問題標題]]
  [Google Security P***h][CVE_2017_16643]ID Vulnerability in USB driver (Device Specific)
  [[問題現象]]
  [Google Security P***h][CVE_2017_16643]ID Vulnerability in USB driver (Device Specific)
  [[解法可能帶來的影響]]
  (請填寫於此行下方，並描述如果合入這個p***h可能會有什麼trade off的改變，如perfo******e降低、UI改變等等)
  None
  [[建議驗證模塊]]
  (請填寫於此行下方，並建議客戶合了此p***h後要驗證哪些module或feature)
  NoneN/A

Associated Files:
  kernel-3.18/drivers/input/tablet/gtco.c

Change-Id: I584cb0ab7b367a80b61730adea475093ca98f3f4
</content>
</entry>
<entry>
<title>Replace &lt;asm/uaccess.h&gt; with &lt;linux/uaccess.h&gt; globally</title>
<updated>2018-11-29T16:49:05+00:00</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2016-12-24T19:46:01+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=8588b01909e0145e5e84f5fe0a5353bd194f205c'/>
<id>urn:sha1:8588b01909e0145e5e84f5fe0a5353bd194f205c</id>
<content type='text'>
This was entirely automated, using the script by Al:

  PATT='^[[:blank:]]*#[[:blank:]]*include[[:blank:]]*&lt;asm/uaccess.h&gt;'
  sed -i -e "s!$PATT!#include &lt;linux/uaccess.h&gt;!" \
        $(git grep -l "$PATT"|grep -v ^include/linux/uaccess.h)

to do the replacement at the end of the merge window.

Requested-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Signed-off-by: Moyster &lt;oysterized@gmail.com&gt;
</content>
</entry>
<entry>
<title>Security Patch: WLAN Gen2: Security Vulnerability Issue 72312071</title>
<updated>2018-11-27T15:39:48+00:00</updated>
<author>
<name>David Chu</name>
<email>david.chu@mediatek.com</email>
</author>
<published>2018-08-07T01:39:15+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=c8d53cd6e731efa326449ccc6292cac871d5ab60'/>
<id>urn:sha1:c8d53cd6e731efa326449ccc6292cac871d5ab60</id>
<content type='text'>
[Detail]
Multiple Kernel Memory Corruption Issues in Mediatek cfg80211 Subsystem

[Solution]
In mtk_cfg80211_vendor_set_config the value num_buckets must be
validated to ensure it is not greater than size of the buckets array.

CVE-2018-9395

Change-Id: If07b758108922dd12ac4eb5d93ce2eab0ce06dae
Signed-off-by: Ben Fennema &lt;fennema@google.com&gt;
Signed-off-by: Moyster &lt;oysterized@gmail.com&gt;
</content>
</entry>
<entry>
<title>Enable Mcast filter in suspend.</title>
<updated>2017-12-23T14:32:34+00:00</updated>
<author>
<name>sunyue5</name>
<email>sunyue5@motorola.com</email>
</author>
<published>2017-03-31T04:49:22+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=8e2c8f8152766995eb7e92bffc8e272365b34ceb'/>
<id>urn:sha1:8e2c8f8152766995eb7e92bffc8e272365b34ceb</id>
<content type='text'>
Change-Id: I646a7fbb6e1ee6f4c28044b49422467a0d66b0d3
Signed-off-by: sunyue5 &lt;sunyue5@motorola.com&gt;
Reviewed-on: https://gerrit.mot.com/971451
SLTApproved: Slta Waiver &lt;sltawvr@motorola.com&gt;
SME-Granted: SME Approvals Granted
Tested-by: Jira Key &lt;jirakey@motorola.com&gt;
Reviewed-by: xiangpo zhao &lt;zhaoxp3@motorola.com&gt;
Submit-Approved: Jira Key &lt;jirakey@motorola.com&gt;
</content>
</entry>
<entry>
<title>drivers: mtk: move to /vendor/etc/firmware</title>
<updated>2017-12-08T12:44:57+00:00</updated>
<author>
<name>Mister Oyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-12-07T19:13:59+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=e17fca6a8459d306dc40ab203c52f2f165234417'/>
<id>urn:sha1:e17fca6a8459d306dc40ab203c52f2f165234417</id>
<content type='text'>
partially revert moving wifi to vendor/firmware :

https://github.com/Moyster/android_kernel_m2note/commit/7bafe483fbd70668252f724ec04fa950fec4db3f
</content>
</entry>
<entry>
<title>drivers: mtk: connectivity: move wifi firmware to /vendor/firmware</title>
<updated>2017-10-01T17:35:23+00:00</updated>
<author>
<name>Mister Oyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-09-30T15:58:54+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=7bafe483fbd70668252f724ec04fa950fec4db3f'/>
<id>urn:sha1:7bafe483fbd70668252f724ec04fa950fec4db3f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>misc: replace __FUNCTION__ by __function__</title>
<updated>2017-09-23T01:10:48+00:00</updated>
<author>
<name>Moyster</name>
<email>oysterized@gmail.com</email>
</author>
<published>2017-09-23T01:10:48+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=b8d1e07edc8d57883bf4b6ca70228b5a9e6b98b2'/>
<id>urn:sha1:b8d1e07edc8d57883bf4b6ca70228b5a9e6b98b2</id>
<content type='text'>
result of :
git grep -l '__FUNCTION__' | xargs sed -i 's/__FUNCTION__/__func__/g'
</content>
</entry>
<entry>
<title>mt6735: Add an option to multiplex AP and STA on wlan0</title>
<updated>2017-06-04T17:23:39+00:00</updated>
<author>
<name>Diogo Ferreira</name>
<email>defer@cyngn.com</email>
</author>
<published>2016-04-15T17:34:08+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=e5141469bf3130a2f309e57e93fec46e210b1353'/>
<id>urn:sha1:e5141469bf3130a2f309e57e93fec46e210b1353</id>
<content type='text'>
This adds CONFIG_MTK_COMBO_AOSP_TETHERING_SUPPORT which, when enabled,
allows ap and wlan to co-exist in the same interface, as Android
expects.

Most of this functionality is also available (albeit not compilable broken)
under CFG_TC1_FEATURE but that has larger implications around the radio
and usb stack that we do not want to adopt.

Change-Id: Ib1d1be40566f1bb9ccc7be45b49ec8d1f3b3ba58
Ticket: PORRIDGE-30
</content>
</entry>
<entry>
<title>gl_p2p_kal: don't dereference 5ghz channels when disabled</title>
<updated>2017-04-13T10:34:36+00:00</updated>
<author>
<name>Diogo Ferreira</name>
<email>diogo@underdev.org</email>
</author>
<published>2016-09-28T15:34:29+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=87b149191371f914a17cbfd7aaa8e420a5f5a877'/>
<id>urn:sha1:87b149191371f914a17cbfd7aaa8e420a5f5a877</id>
<content type='text'>
Change-Id: I8b08502528c4c80f813ebc2efc97e06298ca927d
Ticket: PORRIDGE-495
</content>
</entry>
</feed>
