lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 18 May 2019 13:27:12 -0700 (PDT) From: David Miller <davem@...emloft.net> To: jasowang@...hat.com Cc: mst@...hat.com, virtualization@...ts.linux-foundation.org, kvm@...r.kernel.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, pbonzini@...hat.com, stefanha@...hat.com Subject: Re: [PATCH V2 0/4] Prevent vhost kthread from hogging CPU From: Jason Wang <jasowang@...hat.com> Date: Fri, 17 May 2019 00:29:48 -0400 > Hi: > > This series try to prevent a guest triggerable CPU hogging through > vhost kthread. This is done by introducing and checking the weight > after each requrest. The patch has been tested with reproducer of > vsock and virtio-net. Only compile test is done for vhost-scsi. > > Please review. > > This addresses CVE-2019-3900. > > Changs from V1: > - fix user-ater-free in vosck patch I am assuming that not only will mst review this, it will also go via his tree rather than mine. Thanks.
Powered by blists - more mailing lists