)]}'
{
  "commit": "e3c4e3ee03b002a8e2c8dfd85d6acaf21ea6bae5",
  "tree": "1a16ff980ec347e08757ab3ae8050a47f3f46045",
  "parents": [
    "30e4756a0a1122a53e663e99130dbd560163db94"
  ],
  "author": {
    "name": "Sean Christopherson",
    "email": "seanjc@google.com",
    "time": "Wed Feb 02 00:49:43 2022 +0000"
  },
  "committer": {
    "name": "COS Cherry Picker",
    "email": "cloud-image-release@prod.google.com",
    "time": "Thu Aug 25 16:34:55 2022 -0700"
  },
  "message": "KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits\n\nUse the recently introduced __try_cmpxchg_user() to update guest PTE A/D\nbits instead of mapping the PTE into kernel address space.  The VM_PFNMAP\npath is broken as it assumes that vm_pgoff is the base pfn of the mapped\nVMA range, which is conceptually wrong as vm_pgoff is the offset relative\nto the file and has nothing to do with the pfn.  The horrific hack worked\nfor the original use case (backing guest memory with /dev/mem), but leads\nto accessing \"random\" pfns for pretty much any other VM_PFNMAP case.\n\nBUG\u003db/242694075\nTEST\u003dhttp://sponge2/5746147e-f595-4b7e-a4d3-709a5d307e2b\nRELEASE_NOTE\u003dFixed CVE-2022-1158 in Linux Kernel\nSOURCE\u003dUPSTREAM(f122dfe4476890d60b8c679128cd2259ec96a24c)\n\ncos-patch: security-high\nFixes: bd53cb35a3e9 (\"X86/KVM: Handle PFNs outside of kernel reach when touching GPTEs\")\nDebugged-by: Tadeusz Struk \u003ctadeusz.struk@linaro.org\u003e\nTested-by: Tadeusz Struk \u003ctadeusz.struk@linaro.org\u003e\nReported-by: syzbot+6cde2282daa792c49ab8@syzkaller.appspotmail.com\nCc: stable@vger.kernel.org\nSigned-off-by: Sean Christopherson \u003cseanjc@google.com\u003e\nMessage-Id: \u003c20220202004945.2540433-4-seanjc@google.com\u003e\nSigned-off-by: Paolo Bonzini \u003cpbonzini@redhat.com\u003e\nChange-Id: I8eab2801d2a6c322f5530f2e14214d5623d85010\nReviewed-on: https://cos-review.googlesource.com/c/third_party/kernel/+/36294\nTested-by: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\nMain-Branch-Verified: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\nReviewed-by: Meena Shanmugam \u003cmeenashanmugam@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "1a1d2b5e7b357c16354a60d1b4d6a7d242408da0",
      "old_mode": 33188,
      "old_path": "arch/x86/kvm/paging_tmpl.h",
      "new_id": "d1a5e5dc2386ea5d8a6bbbf3686c75e089480f68",
      "new_mode": 33188,
      "new_path": "arch/x86/kvm/paging_tmpl.h"
    }
  ]
}
