ACK/cmnt: [SRU][Trusty][Xenial][PATCH 2/2] UBUNTU: SAUCE: mm: Respect FOLL_FORCE/FOLL_COW for thp

Stefan Bader stefan.bader at canonical.com
Tue Jan 31 08:49:53 UTC 2017


This patch is following up on one that was a CVE and seems to cause infinite
looping in some cases at least on Xenial[1]. So ACK for Trusty, Xenial, Yakkety,
and Zesty. Maybe Precise, too?

-Stefan

[1] https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1660518

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20170131/be691ba9/attachment.sig>


More information about the kernel-team mailing list