{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":207072855,"defaultBranch":"lineage-21","name":"android_kernel_google_msm-4.9","ownerLogin":"LineageOS","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2019-09-08T06:42:34.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/24304779?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1712008384.0","currentOid":""},"activityList":{"items":[{"before":"f7baa3660d5ef353fd83d23140c1b7a2f8d2066c","after":"a64c90281b01d8c38b5586981c07452a7a4ee463","ref":"refs/heads/lineage-21","pushedAt":"2024-04-01T21:53:04.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge branch 'android-msm-pixel-4.9' into lineage-21\n\n* 'android-msm-pixel-4.9':\n iommu: Fix missing return check of arm_lpae_init_pte\n\nChange-Id: I378a8edde1d056f8488649e34da57a83102306da","shortMessageHtmlLink":"Merge branch 'android-msm-pixel-4.9' into lineage-21"}},{"before":"87b7744d0f6c71aa8e031fad257491dc6cdb1f0c","after":"f7baa3660d5ef353fd83d23140c1b7a2f8d2066c","ref":"refs/heads/lineage-21","pushedAt":"2024-03-29T09:14:14.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge branch 'android-msm-pixel-4.9' into lineage-21\n\n* 'android-msm-pixel-4.9':\n BACKPORT: memshare: Prevent possible integer overflow\n\nChange-Id: Ia2e31af7e054865b688985be506ed58514092247","shortMessageHtmlLink":"Merge branch 'android-msm-pixel-4.9' into lineage-21"}},{"before":"7fdab8ea22e558629726bcd333a05938e5190bf5","after":"39b19c29956db9606bc5cebb770f5784bc76d5a8","ref":"refs/heads/lineage-20","pushedAt":"2024-01-16T17:03:47.000Z","pushType":"push","commitsCount":6,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"dsp: q6lsm: Address use after free for mmap handle\n\nThe global declared mmap_handle can be left dangling\nfor case when the handle is freed by the calling function.\nFix is to address this. Also add a check to make sure\nthe mmap_handle is accessed legally.\n\nChange-Id: I367f8a41339aa0025b545b125ee820220efedeee\nSigned-off-by: Soumya Managoli ","shortMessageHtmlLink":"dsp: q6lsm: Address use after free for mmap handle"}},{"before":"b785424dc4a0556e3fb7af1f39ad423f1f806036","after":"87b7744d0f6c71aa8e031fad257491dc6cdb1f0c","ref":"refs/heads/lineage-21","pushedAt":"2024-01-07T22:48:12.000Z","pushType":"push","commitsCount":6,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"dsp: q6lsm: Address use after free for mmap handle\n\nThe global declared mmap_handle can be left dangling\nfor case when the handle is freed by the calling function.\nFix is to address this. Also add a check to make sure\nthe mmap_handle is accessed legally.\n\nChange-Id: I367f8a41339aa0025b545b125ee820220efedeee\nSigned-off-by: Soumya Managoli ","shortMessageHtmlLink":"dsp: q6lsm: Address use after free for mmap handle"}},{"before":"7fdab8ea22e558629726bcd333a05938e5190bf5","after":"b785424dc4a0556e3fb7af1f39ad423f1f806036","ref":"refs/heads/lineage-21","pushedAt":"2023-11-13T17:54:51.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"arm64: configs: b4s4: enable CONFIG_MEMBARRIER\n\nBug: 123658872\nTest: build and boot\nChange-Id: I8285e3749cca4b0b7e3e560a1251949cc66ca70d\nSigned-off-by: Petri Gynther ","shortMessageHtmlLink":"arm64: configs: b4s4: enable CONFIG_MEMBARRIER"}},{"before":"7bf02f390b0f9f52372b1673c8fa29c132147767","after":"7fdab8ea22e558629726bcd333a05938e5190bf5","ref":"refs/heads/lineage-21","pushedAt":"2023-11-09T18:53:24.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"ASoC: msm-pcm-voip: Avoid interger underflow\n\nThere is no check for voip pkt pkt_len,if it contains the\nminimum required data. This can lead to integer underflow.\nAdd check for the same.\n\nChange-Id: I91d4f2ad8dfb060cdb2ab9e36dc9f886ea40908a\nSigned-off-by: Soumya Managoli ","shortMessageHtmlLink":"ASoC: msm-pcm-voip: Avoid interger underflow"}},{"before":"7bf02f390b0f9f52372b1673c8fa29c132147767","after":"7fdab8ea22e558629726bcd333a05938e5190bf5","ref":"refs/heads/lineage-20","pushedAt":"2023-11-09T18:46:27.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"ASoC: msm-pcm-voip: Avoid interger underflow\n\nThere is no check for voip pkt pkt_len,if it contains the\nminimum required data. This can lead to integer underflow.\nAdd check for the same.\n\nChange-Id: I91d4f2ad8dfb060cdb2ab9e36dc9f886ea40908a\nSigned-off-by: Soumya Managoli ","shortMessageHtmlLink":"ASoC: msm-pcm-voip: Avoid interger underflow"}},{"before":null,"after":"7bf02f390b0f9f52372b1673c8fa29c132147767","ref":"refs/heads/lineage-21","pushedAt":"2023-10-30T13:58:46.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"BACKPORT: qcacld-3.0: Ignore CSA request for invalid channel\n\nIn present scenario, STA disconnects with AP if it receives\ninvalid channel in CSA IE. In this case STA shouldn't\ndisconnect with AP as this request may come from a spoof AP.\n\nIgnore this CSA request as it might be from spoof AP and\nif it is from genuine AP heart beat failure happens and\nresults in disconnection. After disconnection DUT may\nreconnect to same or other APs.\n\nChange-Id: I840508dd27d8c313a3e8f74c4e1f5aa64eecf6f9\nCRs-Fixed: 3390251","shortMessageHtmlLink":"BACKPORT: qcacld-3.0: Ignore CSA request for invalid channel"}},{"before":"c192e0022833cce7bbe86a22f199282e565e7dc6","after":"7bf02f390b0f9f52372b1673c8fa29c132147767","ref":"refs/heads/lineage-20","pushedAt":"2023-09-26T12:17:07.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"BACKPORT: qcacld-3.0: Ignore CSA request for invalid channel\n\nIn present scenario, STA disconnects with AP if it receives\ninvalid channel in CSA IE. In this case STA shouldn't\ndisconnect with AP as this request may come from a spoof AP.\n\nIgnore this CSA request as it might be from spoof AP and\nif it is from genuine AP heart beat failure happens and\nresults in disconnection. After disconnection DUT may\nreconnect to same or other APs.\n\nChange-Id: I840508dd27d8c313a3e8f74c4e1f5aa64eecf6f9\nCRs-Fixed: 3390251","shortMessageHtmlLink":"BACKPORT: qcacld-3.0: Ignore CSA request for invalid channel"}},{"before":"c192e0022833cce7bbe86a22f199282e565e7dc6","after":"b4678afcb83f63dc4fcaa06de033dc0551efe40f","ref":"refs/heads/lineage-19.1","pushedAt":"2023-06-10T10:23:42.713Z","pushType":"push","commitsCount":1,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Revert \"Revert \"uapi: Export sockaddr_storage for userspace\"\"\n\nThis is still needed in 19.1.\n\nThis reverts commit acc5cfc0ac00c4b1b0f245d16e1794ca2f309df5.\n\nChange-Id: I69b1ed2f237a17762eb65499847fa0c169298309","shortMessageHtmlLink":"Revert \"Revert \"uapi: Export sockaddr_storage for userspace\"\""}},{"before":"85c597dafc2516b06df76d53081fed2eeeb5aedd","after":"c192e0022833cce7bbe86a22f199282e565e7dc6","ref":"refs/heads/lineage-19.1","pushedAt":"2023-06-08T08:13:24.576Z","pushType":"push","commitsCount":2,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Revert \"ASoC: ops: Fix the bounds checking in snd_soc_put_volsw_sx and snd_soc_put_xr_sx\"\n\nThis is now properly fixed in a9780a455880039a3df5617a56b2427a818fc065.\n\nThis reverts commit f2afdebb054e7e620b96d1918d87e7f02b3bca11.\n\nChange-Id: I12e26bc35c4d7e0f87ff024a7073638c915fec4a","shortMessageHtmlLink":"Revert \"ASoC: ops: Fix the bounds checking in snd_soc_put_volsw_sx an…"}},{"before":"85c597dafc2516b06df76d53081fed2eeeb5aedd","after":"c192e0022833cce7bbe86a22f199282e565e7dc6","ref":"refs/heads/lineage-20","pushedAt":"2023-06-08T08:11:44.891Z","pushType":"push","commitsCount":2,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Revert \"ASoC: ops: Fix the bounds checking in snd_soc_put_volsw_sx and snd_soc_put_xr_sx\"\n\nThis is now properly fixed in a9780a455880039a3df5617a56b2427a818fc065.\n\nThis reverts commit f2afdebb054e7e620b96d1918d87e7f02b3bca11.\n\nChange-Id: I12e26bc35c4d7e0f87ff024a7073638c915fec4a","shortMessageHtmlLink":"Revert \"ASoC: ops: Fix the bounds checking in snd_soc_put_volsw_sx an…"}},{"before":"dc5f460d7106c08c51f5c5658d4f31f41259a20f","after":"85c597dafc2516b06df76d53081fed2eeeb5aedd","ref":"refs/heads/lineage-19.1","pushedAt":"2023-06-06T22:32:07.071Z","pushType":"push","commitsCount":782,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"ASoC: msm-pcm-q6-v2: Add dsp buf check\n\nCurrent logic copies user buf size of data\nfrom the avail dsp buf at a given offset.\nIf this offset returned from DSP in READ_DONE event\ngoes out of bounds or is corrupted, then it can lead to\nout of bounds DSP buffer access, resulting in memory fault.\nFix is to add check for this buf offset, if it is within\nthe buf size range.\n\nChange-Id: I7753cc6db394704dbb959477150141d42b836bef\nSigned-off-by: Soumya Managoli ","shortMessageHtmlLink":"ASoC: msm-pcm-q6-v2: Add dsp buf check"}},{"before":"5cda3006d42c598fd0ce0ca336f27b55c904f385","after":"85c597dafc2516b06df76d53081fed2eeeb5aedd","ref":"refs/heads/lineage-20","pushedAt":"2023-06-06T20:07:46.332Z","pushType":"push","commitsCount":4,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"ASoC: msm-pcm-q6-v2: Add dsp buf check\n\nCurrent logic copies user buf size of data\nfrom the avail dsp buf at a given offset.\nIf this offset returned from DSP in READ_DONE event\ngoes out of bounds or is corrupted, then it can lead to\nout of bounds DSP buffer access, resulting in memory fault.\nFix is to add check for this buf offset, if it is within\nthe buf size range.\n\nChange-Id: I7753cc6db394704dbb959477150141d42b836bef\nSigned-off-by: Soumya Managoli ","shortMessageHtmlLink":"ASoC: msm-pcm-q6-v2: Add dsp buf check"}},{"before":"c9d200e40fa85bd20d55316e5c558698701aa518","after":"5cda3006d42c598fd0ce0ca336f27b55c904f385","ref":"refs/heads/lineage-20","pushedAt":"2023-05-05T17:37:12.000Z","pushType":"push","commitsCount":10,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge branch 'android-msm-pixel-4.9' into lineage-20\n\n* 'android-msm-pixel-4.9':\n ALSA: control: use counting semaphore as write lock for ELEM_WRITE operation\n ALSA: control: Fix memory corruption risk in snd_ctl_elem_read\n ALSA: control: code refactoring for ELEM_READ/ELEM_WRITE operations\n ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF\n msm: kgsl: Make sure that pool pages don't have any extra references\n msm: kgsl: Use dma_buf_get() to get dma_buf structure\n ARM64/errata: Ensure vulnerable CPUs are actually flagged on `is_spectrev2_safe()`\n ARM64/errata: Check `arm64_psci_bp_harden_cpus` list too for `is_spectrev2_safe()`\n ARM64/errata: Kryo 2xx/3xx Gold might be affected by Spectre BHB\n\nChange-Id: Ibef1c4f7bc8bb88bf1208dfb1ea043bb3f9fa8e4","shortMessageHtmlLink":"Merge branch 'android-msm-pixel-4.9' into lineage-20"}},{"before":"6789fad5a91c82eae217b6f1bc6534ab534bed65","after":"c9d200e40fa85bd20d55316e5c558698701aa518","ref":"refs/heads/lineage-20","pushedAt":"2023-04-10T11:37:54.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge branch 'android-msm-pixel-4.9' into lineage-20\n\n* 'android-msm-pixel-4.9':\n ANDROID: usb: f_accessory: Check buffer size when initialised via composite\n\nChange-Id: I719d489b4ae8dc04300980e571551dd09c9728d0","shortMessageHtmlLink":"Merge branch 'android-msm-pixel-4.9' into lineage-20"}},{"before":"7cceab280317bc802ebff9a42b6a5291012c896f","after":"6789fad5a91c82eae217b6f1bc6534ab534bed65","ref":"refs/heads/lineage-20","pushedAt":"2023-03-17T14:38:22.000Z","pushType":"push","commitsCount":259,"pusher":{"login":"lineageos-gerrit","name":null,"path":"/lineageos-gerrit","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24783018?s=80&v=4"},"commit":{"message":"Merge branch 'android-msm-pixel-4.9' into lineage-20\n\nChange-Id: I3bb2b31495b5d29b02f749271606c86771eab5df","shortMessageHtmlLink":"Merge branch 'android-msm-pixel-4.9' into lineage-20"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEJOOXTwA","startCursor":null,"endCursor":null}},"title":"Activity · LineageOS/android_kernel_google_msm-4.9"}