kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* (unknown), 
@ 2016-07-28  6:11 Paul Mackerras
  2016-07-28  6:11 ` [PATCH 1/2] KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures Paul Mackerras
                   ` (2 more replies)
  0 siblings, 3 replies; 4+ messages in thread
From: Paul Mackerras @ 2016-07-28  6:11 UTC (permalink / raw)
  To: kvm, kvm-ppc

These two patches fix a denial-of-service vulnerability in the host
kernel when running guests using HV-style KVM on POWER8 machines.
It turns out that if a user process starts a transaction and then
does an exec system call, it can not only crash the guest kernel
but also cause one or more host CPUs to hang.  This vulnerability
has been assigned the ID CVE-2016-5412.  This patch series is the
fix for the vulnerability.  I would like to get these patches into
v4.8-rc1 and also into the stable trees.

Paul.

 arch/powerpc/kvm/book3s_hv_rmhandlers.S | 462 +++++++++++++++++---------------
 1 file changed, 250 insertions(+), 212 deletions(-)

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2016-07-28  6:14 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-07-28  6:11 (unknown), Paul Mackerras
2016-07-28  6:11 ` [PATCH 1/2] KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures Paul Mackerras
2016-07-28  6:11 ` [PATCH 2/2] KVM: PPC: Book3S HV: Save/restore TM state in H_CEDE Paul Mackerras
2016-07-28  6:14 ` [PATCH 0/2] KVM: PPC: Fix host DOS vulnerability in HV KVM Paul Mackerras

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).