diff options
| author | Christian Krinitsin <mail@krinitsin.com> | 2025-06-30 12:34:26 +0000 |
|---|---|---|
| committer | Christian Krinitsin <mail@krinitsin.com> | 2025-06-30 12:35:44 +0000 |
| commit | 25f8033d556aa17afaea4a5196ea7a69fe248320 (patch) | |
| tree | 0f056db167683be54ea1e5e72d29d6069af55e7d /results/classifier/deepseek-2-tmp/output/KVM/1687653 | |
| parent | 8e6da29e4ee5fc14bc1cc816a24f21271f14090d (diff) | |
| download | emulator-bug-study-25f8033d556aa17afaea4a5196ea7a69fe248320.tar.gz emulator-bug-study-25f8033d556aa17afaea4a5196ea7a69fe248320.zip | |
add new temporary deepseek-r1:14b results
Diffstat (limited to 'results/classifier/deepseek-2-tmp/output/KVM/1687653')
| -rw-r--r-- | results/classifier/deepseek-2-tmp/output/KVM/1687653 | 66 |
1 files changed, 66 insertions, 0 deletions
diff --git a/results/classifier/deepseek-2-tmp/output/KVM/1687653 b/results/classifier/deepseek-2-tmp/output/KVM/1687653 new file mode 100644 index 00000000..5e295586 --- /dev/null +++ b/results/classifier/deepseek-2-tmp/output/KVM/1687653 @@ -0,0 +1,66 @@ + +QEMU-KVM / detect_zeroes causes KVM to start unlimited number of threads on Guest-Sided High-IO with big Blocksize + +QEMU-KVM in combination with "detect_zeroes=on" makes a Guest able to DoS the Host. This is possible if the Host itself has "detect_zeroes" enabled and the Guest writes a large Chunk of data with a huge blocksize onto the drive. + +E.g.: dd if=/dev/zero of=/tmp/DoS bs=1G count=1 oflag=direct + +All QEMU-Versions after implementation of detect_zeroes are affected. Prior are unaffected. This is absolutely critical, please fix this ASAP! + +##### + +Provided by Dominik Csapak: + +source , bs , count , O_DIRECT, behaviour + +urandom , bs 1M, count 1024, O_DIRECT: OK +file , bs 1M, count 1024, O_DIRECT: OK +/dev/zero , bs 1M, count 1024, O_DIRECT: OK +zero file , bs 1M, count 1024, O_DIRECT: OK +/dev/zero , bs 1G, count 1, O_DIRECT: NOT OK +zero file , bs 1G, count 1, O_DIRECT: NOT OK +zero file , bs 1G, count 1, no O_DIRECT: NOT OK +rand file , bs 1G, count 1, O_DIRECT: OK +rand file , bs 1G, count 1, no O_DIRECT: OK + +discard on: + +urandom , bs 1M, count 1024, O_DIRECT: OK +rand file , bs 1M, count 1024, O_DIRECT: OK +/dev/zero , bs 1M, count 1024, O_DIRECT: OK +zero file , bs 1M, count 1024, O_DIRECT: OK +/dev/zero , bs 1G, count 1, O_DIRECT: NOT OK +zero file , bs 1G, count 1, O_DIRECT: NOT OK +zero file , bs 1G, count 1, no O_DIRECT: NOT OK +rand file , bs 1G, count 1, O_DIRECT: OK +rand file , bs 1G, count 1, no O_DIRECT: OK + +detect_zeros off: + +urandom , bs 1M, count 1024, O_DIRECT: OK +rand file , bs 1M, count 1024, O_DIRECT: OK +/dev/zero , bs 1M, count 1024, O_DIRECT: OK +zero file , bs 1M, count 1024, O_DIRECT: OK +/dev/zero , bs 1G, count 1, O_DIRECT: OK +zero file , bs 1G, count 1, O_DIRECT: OK +zero file , bs 1G, count 1, no O_DIRECT: OK +rand file , bs 1G, count 1, O_DIRECT: OK +rand file , bs 1G, count 1, no O_DIRECT: OK + +##### + +Provided by Florian Strankowski + +bs - count - io-threads + +512K - 2048 - 2 +1M - 1024 - 2 +2M - 512 - 4 +4M - 256 - 6 +8M - 128 - 10 +16M - 64 - 18 +32M - 32 - uncountable + +Please refer to further information here: + +https://bugzilla.proxmox.com/show_bug.cgi?id=1368
\ No newline at end of file |
