A tight loop in user level process isn't preempted unless a
realtime process is woken up on the cpu. Some important kernel
threads such as events/*, kblockd/* can be blocked by the process,
and the machine stalls. Unprivileged local user could use this
flaw to DoS the system.
Fixes for this have hit all affected branches other than maverick/ti-omap4
via mainline and stable. Following this email is a patch for
maverick/ti-omap4. This is a direct cherry-pick of the stable update
fix applied to maverick.
Proposing for maverick/ti-omap4.
Tim Gardner email@example.com
kernel-team mailing list