)]}'
{
  "commit": "92615a5ab96cd2b4981e2aaef40bece6cd7553b6",
  "tree": "d3a7437e69595b1da0e5c8bc2169d1ccd40a88fe",
  "parents": [
    "45e45ed2d61fb287adf03e49c74c152bfd2c975a"
  ],
  "author": {
    "name": "David Gibson",
    "email": "david@gibson.dropbear.id.au",
    "time": "Mon Apr 02 14:17:35 2012 +1000"
  },
  "committer": {
    "name": "Andreas Färber",
    "email": "afaerber@suse.de",
    "time": "Sun Apr 15 20:02:09 2012 +0200"
  },
  "message": "pseries: Fix RTAS based config access\n\nOn the pseries platform, access to PCI config space is via RTAS calls(\nwhich go to the hypervisor) rather than MMIO.  This means we don\u0027t use\nthe same code path as nearly everyone else which goes through pci_host.c\nand we\u0027re missing some of the parameter checking along the way.\n\nWe do have some parameter checking in the RTAS calls, but it\u0027s not enough.\nIt checks for overruns, but does not check for unaligned accesses,\noversized accesses (which means the guest could trigger an assertion\nfailure from pci_host_config_{read,write}_common().  Worse it doesn\u0027t do\nthe basic checking for the number of RTAS arguments and results before\naccessing them.\n\nThis patch fixes these bugs.\n\nCc: Michael S. Tsirkin \u003cmst@redhat.com\u003e\n\nSigned-off-by: David Gibson \u003cdavid@gibson.dropbear.id.au\u003e\n[AF: Fix typos spotted by mst]\nSigned-off-by: Andreas Färber \u003cafaerber@suse.de\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "e7ef551c1c2493ad702fda8abb49dfba9dbbcb11",
      "old_mode": 33188,
      "old_path": "hw/spapr_pci.c",
      "new_id": "a564c007b49d6f80e1ecdd8c43510205313a665d",
      "new_mode": 33188,
      "new_path": "hw/spapr_pci.c"
    }
  ]
}
