)]}'
{
  "commit": "2e9beb0bcb334ea993646ffeaa28aa67fe716ff9",
  "tree": "ef9188945fce0de6f56c61f374ef8b5d3074aaac",
  "parents": [
    "49b110491153d954646282c84f81976f83b8041b"
  ],
  "author": {
    "name": "Steve Rutherford",
    "email": "srutherford@google.com",
    "time": "Thu Aug 24 15:37:31 2023 -0700"
  },
  "committer": {
    "name": "COS Cherry Picker",
    "email": "cloud-image-release@prod.google.com",
    "time": "Thu Sep 07 14:06:31 2023 -0700"
  },
  "message": "x86/sev: Make enc_dec_hypercall() accept a size instead of npages\n\nenc_dec_hypercall() accepted a page count instead of a size, which\nforced its callers to round up. As a result, non-page aligned\nvaddrs caused pages to be spuriously marked as decrypted via the\nencryption status hypercall, which in turn caused consistent\ncorruption of pages during live migration. Live migration requires\naccurate encryption status information to avoid migrating pages\nfrom the wrong perspective.\n\nBUG\u003db/297544590\nTEST\u003dpresubmit\nRELEASE_NOTE\u003dNone\n\ncos-patch: bug\nFixes: 064ce6c550a0 (\"mm: x86: Invoke hypercall when page encryption status is changed\")\nSigned-off-by: Steve Rutherford \u003csrutherford@google.com\u003e\nSigned-off-by: Ingo Molnar \u003cmingo@kernel.org\u003e\nReviewed-by: Tom Lendacky \u003cthomas.lendacky@amd.com\u003e\nReviewed-by: Pankaj Gupta \u003cpankaj.gupta@amd.com\u003e\nTested-by: Ben Hillier \u003cbhillier@google.com\u003e\nCc: stable@vger.kernel.org\nLink: https://lore.kernel.org/r/20230824223731.2055016-1-srutherford@google.com\nChange-Id: I09c552b5ce1a030030d7585cbff29a309b5e680a\nReviewed-on: https://cos-review.googlesource.com/c/third_party/kernel/+/56568\nReviewed-by: Arnav Kansal \u003crnv@google.com\u003e\nTested-by: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\nMain-Branch-Verified: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "ca86c68feb7daa3a18e3592b7c6001a8ed138f8e",
      "old_mode": 33188,
      "old_path": "arch/x86/include/asm/mem_encrypt.h",
      "new_id": "6c6f6aa7589e0ee62bd2589cc37077e920b4d911",
      "new_mode": 33188,
      "new_path": "arch/x86/include/asm/mem_encrypt.h"
    },
    {
      "type": "modify",
      "old_id": "b9ab16a8027e6dde62316d81ee5d6d0ac541e052",
      "old_mode": 33188,
      "old_path": "arch/x86/kernel/kvm.c",
      "new_id": "dc3900f7ae414f79e21566eff6503457b54b2ed3",
      "new_mode": 33188,
      "new_path": "arch/x86/kernel/kvm.c"
    },
    {
      "type": "modify",
      "old_id": "a27ba29f554968705fa3207f45bedc958c442aab",
      "old_mode": 33188,
      "old_path": "arch/x86/mm/mem_encrypt_amd.c",
      "new_id": "53ff5e8b95d73912140e92b4d65bc1c42c0f31d7",
      "new_mode": 33188,
      "new_path": "arch/x86/mm/mem_encrypt_amd.c"
    }
  ]
}
