lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080703212939.1275.27072.stgit@lsg.lsg.lab.novell.com>
Date:	Thu, 03 Jul 2008 15:37:06 -0600
From:	Gregory Haskins <ghaskins@...ell.com>
To:	stable@...r.kernel.org, linux-rt-users@...r.kernel.org,
	rostedt@...dmis.org, mingo@...e.hu
Cc:	peterz@...radead.org, ghaskins@...ell.com,
	linux-kernel@...r.kernel.org
Subject: [PATCH 0/2] sched: misc fixes for stable-25.y and 25-rt

Hi Ingo, Steven, Peter,
  I found a few minor issues w.r.t. the CFS load values during a few
  dequeue/enqueue operations in the 2.6.25 kernel.  I found these via
  code review as opposed to observing a bug in the field.  I believe
  at least the first issue is already fixed in 26-rcx.  I have
  confirmed that the issue is present in both 25.8-rt7 as well as
  stable-2.6.25.10.  These patches are against 25.8-rt7, though they
  should apply trivially to stable as well.  Please consider for
  inclusion in the next -rt if the -stable team does not pick them up
  immediately.

Stable team,
  Please consider these patches for 25.11 (assuming the appropriate acks
  from Ingo et. al. are recieved) though I do not believe they are
  considered significant risks and are therefore not urgent.

Feedback welcome..

Thanks!
-Greg
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ