These two patches fix a denial-of-service vulnerability in the host kernel when running guests using HV-style KVM on POWER8 machines. It turns out that if a user process starts a transaction and then does an exec system call, it can not only crash the guest kernel but also cause one or more host CPUs to hang. This vulnerability has been assigned the ID CVE-2016-5412. This patch series is the fix for the vulnerability. I would like to get these patches into v4.8-rc1 and also into the stable trees. Paul. arch/powerpc/kvm/book3s_hv_rmhandlers.S | 462 +++++++++++++++++--------------- 1 file changed, 250 insertions(+), 212 deletions(-) -- To unsubscribe from this list: send the line "unsubscribe kvm-ppc" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html