lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 4 Dec 2007 22:04:30 +0100
From:	Ingo Molnar <>
To:	"Luiz Fernando N. Capitulino" <>
Cc:	Greg KH <>,
	Linus Torvalds <>,
	Linux Kernel Mailing List <>,,
Subject: Re: [git pull] scheduler fixes

* Luiz Fernando N. Capitulino <> wrote:

> | >    git://
> | > 
> | > It has another commit besides this fix. Thanks,
> | 
> | Can you make up something that I can apply for 2.6.23-stable?  or is 
> | this not an issue on that tree?
>  FWIW I couldn't reproduce the problem with sched_slice() is 
> quite different on that kernel and _maybe_ it won't never divide by 
> zero.

no, this is due to a fairly recent commit, so 2.6.23 should not be 
affected. (We cleaned up sched_rr_interval() in one of the 2.6.24 
scheduler commits.)

>  My original report on vendor-sec was wrong. I've said that 
> had the same bug but turns out the kernel I tested had the Ingo's CFS 
> backport patch applied. I didn't know that, I thought it was a vanilla 
> kernel.
>  Btw, I think it's important to release a new CFS backport patch 
> because maybe some distro is using it (Mandriva stable kernel is using 
> the CFS backport patch, but we didn't update to latest version yet).

this should only affect the v24 CFS version - i've updated the v24 
backport patches. sched_rr_interval() is almost never used, and it's 
basically never used for SCHED_OTHER tasks.

To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to
More majordomo info at
Please read the FAQ at

Powered by blists - more mailing lists