We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix NEXT_BUDDY Adam reports that enabling NEXT_BUDDY insta triggers a WARN in pick_next_entity(). Moving clear_buddies() up before the delayed dequeue bits ensures no ->next buddy becomes delayed. Further ensure no new ->next buddy ever starts as delayed.
Reserved 2025-01-11 | Published 2025-01-11 | Updated 2025-01-20 | Assigner Linuxgit.kernel.org/...c/5dbe6816c49197677a5ecce749bd99929da147da
git.kernel.org/...c/493afbd187c4c9cc1642792c0d9ba400c3d6d90d
Support options