[RESEND][SRU][Trusty][Xenial][PATCH 0/2] Fixes for lp1658270
Joseph Salisbury
joseph.salisbury at canonical.com
Mon Jan 30 21:27:50 UTC 2017
On 01/27/2017 05:08 PM, Joseph Salisbury wrote:
> BugLink: http://bugs.launchpad.net/bugs/1658270
>
> == SRU Justification ==
> Commit 082d4acb9429 in Trusty introduced this bug in Ubuntu-3.13.0-100.147.
> The commit was added to Trusty for via a CVE update.
> The bug resulted in some Delphi apps freezing wineserver and leaving it unkillable
> as reported in this upstream bug report:
> https://bugs.winehq.org/show_bug.cgi?id=41637
>
> This bug was also introduced into Xenial by the same patch(Xenial commit b56d2a75e1da).
>
> A patch was submitted upstrem to fix this bug, but it has not landed in mailine as of yet:
> https://patchwork.kernel.org/patch/9499897/
>
> This patch has been tested and resolves this bug. However, it requires
> mainline commit c164e038eee8 as a prereq in Trusty only. Commit c164e038eee8 needed to be backported
> to Trusty since it was not a clean pick.
>
>
> == Fixes ==
> Trusty only:
> commit c164e038eee805147e95789dddb88ae3b3aca11c
> Author: Kirill A. Shutemov <kirill at shutemov.name>
> Date: Wed Dec 10 15:44:36 2014 -0800
>
> mm: fix huge zero page accounting in smaps report
>
> Both Trusty and Xenial:
> Author: Keno Fischer <keno at juliacomputing.com>
> Date: Mon Jan 23 15:35:50 2017 -0500
>
> mm: Respect FOLL_FORCE/FOLL_COW for thp
>
>
> == Test Case ==
> A test kernel was built with these patches and tested by the original bug reporter.
> The bug reporter states the test kernel resolved the bug.
>
> Keno Fischer (1):
> mm: Respect FOLL_FORCE/FOLL_COW for thp
>
> Kirill A. Shutemov (1):
> mm: fix huge zero page accounting in smaps report
>
> arch/arm64/include/asm/pgtable.h | 18 ++++++
> arch/powerpc/include/asm/pgtable-ppc64.h | 1 +
> arch/sparc/include/asm/pgtable_64.h | 7 +++
> arch/x86/include/asm/pgtable.h | 5 ++
> fs/proc/task_mmu.c | 104 ++++++++++++++++++++-----------
> mm/huge_memory.c | 12 +++-
> 6 files changed, 110 insertions(+), 37 deletions(-)
>
Can someone review and possible ack so these can be included in the
upcoming cycle?
More information about the kernel-team
mailing list