ACK/cmnt: [SRU][Trusty][Xenial][PATCH 2/2] UBUNTU: SAUCE: mm: Respect FOLL_FORCE/FOLL_COW for thp
Stefan Bader
stefan.bader at canonical.com
Tue Jan 31 11:51:12 UTC 2017
On 31.01.2017 09:49, Stefan Bader wrote:
> This patch is following up on one that was a CVE and seems to cause infinite
> looping in some cases at least on Xenial[1]. So ACK for Trusty, Xenial, Yakkety,
> and Zesty. Maybe Precise, too?
I would say Precise also needs this since some variant of the
"mm: remove gup_flags FOLL_WRITE games from __get_user_pages()"
went there as well.
-Stefan
> [1] https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1660518
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20170131/878ae7fc/attachment.sig>
More information about the kernel-team
mailing list