From mboxrd@z Thu Jan 1 00:00:00 1970 From: Paul Mackerras Subject: (unknown) Date: Thu, 28 Jul 2016 16:11:17 +1000 Message-ID: <1469686279-2348-1-git-send-email-paulus@ozlabs.org> To: kvm@vger.kernel.org, kvm-ppc@vger.kernel.org Return-path: Received: from ozlabs.org ([103.22.144.67]:52031 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756723AbcG1GL2 (ORCPT ); Thu, 28 Jul 2016 02:11:28 -0400 Subject: Sender: kvm-owner@vger.kernel.org List-ID: These two patches fix a denial-of-service vulnerability in the host kernel when running guests using HV-style KVM on POWER8 machines. It turns out that if a user process starts a transaction and then does an exec system call, it can not only crash the guest kernel but also cause one or more host CPUs to hang. This vulnerability has been assigned the ID CVE-2016-5412. This patch series is the fix for the vulnerability. I would like to get these patches into v4.8-rc1 and also into the stable trees. Paul. arch/powerpc/kvm/book3s_hv_rmhandlers.S | 462 +++++++++++++++++--------------- 1 file changed, 250 insertions(+), 212 deletions(-)