lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 23 May 2019 10:37:39 +0800 From: Jason Wang <jasowang@...hat.com> To: "Michael S. Tsirkin" <mst@...hat.com> Cc: virtualization@...ts.linux-foundation.org, kvm@...r.kernel.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, pbonzini@...hat.com, stefanha@...hat.com Subject: Re: [PATCH V2 0/4] Prevent vhost kthread from hogging CPU On 2019/5/20 下午8:52, Michael S. Tsirkin wrote: > On Fri, May 17, 2019 at 12:29:48AM -0400, Jason Wang wrote: >> Hi: >> >> This series try to prevent a guest triggerable CPU hogging through >> vhost kthread. This is done by introducing and checking the weight >> after each requrest. The patch has been tested with reproducer of >> vsock and virtio-net. Only compile test is done for vhost-scsi. >> >> Please review. >> This addresses CVE-2019-3900. > OK I think we should clean this code some more but given > it's a CVE fix maybe it's best to do as a patch on top. > > Acked-by: Michael S. Tsirkin<mst@...hat.com> > > Dave do you want to merge this or should I? > According to David's last reply, it's better for you to merge I think. Thanks
Powered by blists - more mailing lists