)]}' { "commit": "659beaabf1b059e571ad521eda1f180dbbc40112", "tree": "c4d698200a70b31bb0e0a27c99534f70284f76a0", "parents": [ "6f40735398fd5b7eff8486c0356cdcb4c49b0272" ], "author": { "name": "Pavel Begunkov", "email": "asml.silence@gmail.com", "time": "Mon Oct 17 00:03:11 2022 +0100" }, "committer": { "name": "COS Cherry Picker", "email": "cloud-image-release@prod.google.com", "time": "Fri Oct 21 10:04:09 2022 -0700" }, "message": "io_uring/af_unix: defer registered files gc to io_uring release\n\n[ upstream commit 0091bfc81741b8d3aeb3b7ab8636f911b2de6e80 ]\n\nInstead of putting io_uring\u0027s registered files in unix_gc() we want it\nto be done by io_uring itself. The trick here is to consider io_uring\nregistered files for cycle detection but not actually putting them down.\nBecause io_uring can\u0027t register other ring instances, this will remove\nall refs to the ring file triggering the -\u003erelease path and clean up\nwith io_ring_ctx_free().\n\nCc: stable@vger.kernel.org\nFixes: 6b06314c47e1 (\"io_uring: add file set registration\")\nReported-and-tested-by: David Bouman \u003cdbouman03@gmail.com\u003e\nSigned-off-by: Pavel Begunkov \u003casml.silence@gmail.com\u003e\nSigned-off-by: Thadeu Lima de Souza Cascardo \u003ccascardo@canonical.com\u003e\n[axboe: add kerneldoc comment to skb, fold in skb leak fix]\nSigned-off-by: Jens Axboe \u003caxboe@kernel.dk\u003e\nSigned-off-by: Greg Kroah-Hartman \u003cgregkh@linuxfoundation.org\u003e\n\nBUG\u003db/254721300\nTEST\u003dpresubmit\nRELEASE_NOTE\u003dFixed CVE-2022-2602 in the Linux kernel.\n\ncos-patch: security-high\nChange-Id: I627aa666fe0f4686202b8a4f4bfec26e131c3134\nReviewed-on: https://cos-review.googlesource.com/c/third_party/kernel/+/37851\nReviewed-by: Oleksandr Tymoshenko \u003covt@google.com\u003e\nTested-by: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\nMain-Branch-Verified: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\n", "tree_diff": [ { "type": "modify", "old_id": "501c7e14c07cf1113b7de8691ef6635e36784b25", "old_mode": 33188, "old_path": "fs/io_uring.c", "new_id": "e8df6345a812d29756161fde54acf0e1f95feeae", "new_mode": 33188, "new_path": "fs/io_uring.c" }, { "type": "modify", "old_id": "680f71ecdc08b9eb74da6860cc8362b3cef4101d", "old_mode": 33188, "old_path": "include/linux/skbuff.h", "new_id": "eab3a4d02f325734ea8be9d63f5c3180c15b99e6", "new_mode": 33188, "new_path": "include/linux/skbuff.h" }, { "type": "modify", "old_id": "d45d5366115a769b21bfc1db5a67f7d53c3fa9b8", "old_mode": 33188, "old_path": "net/unix/garbage.c", "new_id": "dc27635403932154f3dec069c2e10d2ae365d8cb", "new_mode": 33188, "new_path": "net/unix/garbage.c" } ] }