Description: mm/gup: fix FOLL_FORCE COW security issue and remove FOLL_COW References: https://lore.kernel.org/linux-mm/20220808073232.8808-1-david@redhat.com/ https://www.openwall.com/lists/oss-security/2022/08/08/1 https://lore.kernel.org/all/20220809205640.70916-1-david@redhat.com/ https://www.openwall.com/lists/oss-security/2022/08/15/1 Notes: carnil> Commit fixes 9ae0f87d009c ("mm/shmem: unconditionally set pte carnil> dirty in mfill_atomic_install_pte") in 5.16-rc1. carnil> David Hildenbrand reports that "Kernels before extended uffd-wp carnil> support and before PageAnonExclusive (< 5.19) can simply revert carnil> the problematic commit instead and be safe regarding carnil> UFFDIO_CONTINUE. A backport to v5.19 requires minor adjustments carnil> due to lack of vma_soft_dirty_enabled()." carnil> Fix is backported as well to 5.19.6 for 5.19.y Bugs: upstream: released (6.0-rc3) [5535be3099717646781ce1540cf725965d680e7b] 5.10-upstream-stable: N/A "Vulnerable code introduced later" 4.19-upstream-stable: N/A "Vulnerable code introduced later" sid: released (5.18.16-1) [bugfix/all/Revert-mm-shmem-unconditionally-set-pte-dirty-in-mfi.patch] 5.10-bullseye-security: N/A "Vulnerable code introduced later" 4.19-buster-security: N/A "Vulnerable code introduced later"