Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp3284471yba; Sat, 18 May 2019 13:28:37 -0700 (PDT) X-Google-Smtp-Source: APXvYqz9yOs8D2m4it4pdDcmKEpkx3c4lsCBSW/gj4X0Y8P5+4GH65mrBJOh4rQqqok08HuINDLu X-Received: by 2002:a17:902:8f98:: with SMTP id z24mr54185789plo.101.1558211317311; Sat, 18 May 2019 13:28:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558211317; cv=none; d=google.com; s=arc-20160816; b=N0JFUE7wSgHevT6vScW3vP5C5dPT3nSpz+p9UgFau8fCKGafarneJqaNYqCxiQRe8w 0GpNdXWf56WEf4jEHCl3bM4Lqh2MybbawhJi7CZrirfrtHMzXSPxpNBbYeUfwZsJnkjo MEkNzIRPNr0WHjmeAtHYA2Jvy4cY0o/t5iqdbqmHaltQsNPvOWPuR8Z6Tuc1I79hw6kU YjEMpS8mRl/uw1gqpn7b4oRQLEnKQdO7h6ljhGZehznlYXygbJaZzsvFzKfUsCEDD7yI a3JN/zpXvI+CvGCQCU1QG8sD5RCj4gt9W+wCW7b6rTCM0nGN6UujWAZc3kx8L/CaAKI3 /UrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=uCqvcdajGK9KEef8H4lqpV3LvfZz2UhqS+5doLt9JFU=; b=VJoLqaMl97HPDs1MPUFohuT5NErnIkOppBYwwdSXaUnUupIoG7CNKGWMOlXoweS/xa /rYItm+8WR/q/oOyVV4z/D9/aV4ghBUrUCf8UxFXPHFRe7lqo0g1yBDqX72zYyBKPYVf B2b+rXKjzfUJmDQ7TpRsM+gBlwaDyhXLFiSWAqJa7qhjqQiAm15KQ5YXH3Dk3miilQTj CiUPr6QSjoHF3PM70nv20i0OAQJNOvh9r20U3RNydsJjPAj+vvjEz8DahamlvKC5R3Ld 2clQq1uz85ak2jzU413lZ1UcWJ3OAV1LP7ls1TGlrVBqeqx0T1mYsAQqASmBOfJOL0q3 8Wcg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q3si13191282pgg.407.2019.05.18.13.28.20; Sat, 18 May 2019 13:28:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729305AbfERU1O (ORCPT + 99 others); Sat, 18 May 2019 16:27:14 -0400 Received: from shards.monkeyblade.net ([23.128.96.9]:59906 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725446AbfERU1O (ORCPT ); Sat, 18 May 2019 16:27:14 -0400 Received: from localhost (unknown [IPv6:2601:601:9f80:35cd::3d8]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 912F614DF4C35; Sat, 18 May 2019 13:27:13 -0700 (PDT) Date: Sat, 18 May 2019 13:27:12 -0700 (PDT) Message-Id: <20190518.132712.1971625204431294331.davem@davemloft.net> To: jasowang@redhat.com Cc: mst@redhat.com, virtualization@lists.linux-foundation.org, kvm@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, pbonzini@redhat.com, stefanha@redhat.com Subject: Re: [PATCH V2 0/4] Prevent vhost kthread from hogging CPU From: David Miller In-Reply-To: <1558067392-11740-1-git-send-email-jasowang@redhat.com> References: <1558067392-11740-1-git-send-email-jasowang@redhat.com> X-Mailer: Mew version 6.8 on Emacs 26.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Sat, 18 May 2019 13:27:13 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jason Wang Date: Fri, 17 May 2019 00:29:48 -0400 > Hi: > > This series try to prevent a guest triggerable CPU hogging through > vhost kthread. This is done by introducing and checking the weight > after each requrest. The patch has been tested with reproducer of > vsock and virtio-net. Only compile test is done for vhost-scsi. > > Please review. > > This addresses CVE-2019-3900. > > Changs from V1: > - fix user-ater-free in vosck patch I am assuming that not only will mst review this, it will also go via his tree rather than mine. Thanks.