Received: by 10.213.65.68 with SMTP id h4csp417977imn; Wed, 4 Apr 2018 00:20:48 -0700 (PDT) X-Google-Smtp-Source: AIpwx49PAZj7CuJiokzegPRzcBdAUO4iR1ksdHoD7TcS8/rjAxeVgdti8/0cGHnzEoNRSfHo2i2E X-Received: by 10.98.174.6 with SMTP id q6mr13017011pff.140.1522826447994; Wed, 04 Apr 2018 00:20:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522826447; cv=none; d=google.com; s=arc-20160816; b=Et8F6J95VHx3iwMe1diM6pLl+Pa3V3m8sXF5ArJWnYLCGC05Z0PTqidQcjJl51iQ5u uIlRz8dHS2Iw82Nx6H54tX/pBDYr+FYmfzz0zGLDc/97DnIITRzNnqqbYbCUc9+l2niO Vr0JGFPQY6f2VlV5qQSweP3FEkpVlivbV9t1TlW+ImSZ9tEJsntULXgcAPZ45tIBC1ce xTFBCNm5roDFgHRX0oUphxNLDH/6igpQR8QOFS4sAnpUN1RdbWFbYXsW5W0tuzCnY7vB XjWrIQhu1FFiCPhwQ3LCS0exEamTBljD20ThDLz6ZcYsuXahRyqh5Q5ACNsNvJU0/ghV Dz/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:arc-authentication-results; bh=8XZ/uzToQD/YDPPndklerP4U2yK0OGt1/orFYPeNeKs=; b=R0JYImD/oS75sr5sKJ1w4LssArDCcXaEo1dxug1mSzBRwLN4o7JJyY+vKG57WzP8wy MzHVpG/DIr32OtD91ALyrkniYGw0gPbw+/sq/qRrSTfziu+GexVIcVM/5CEKJFan/jF7 /V2fhk4PHfRFSN1P3oTIKH2UFNJ9Eauu2lhEfBu0OI5EW7R0CGAV1RThGkTFoi09Hzmw zAONULRLjt2A/XimJFkMcY8xwRNzKuRZC4PFomZyl9ECJCThoLgGLv0b3olsDswILOwn 7VvGNVROPIheqC7chNdFx8XOsISiWNAuItLcDMorOTrPQ6sGIRCBAjg7n42a9yXERKOF Vmrw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=monom.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p11-v6si5935128pli.599.2018.04.04.00.20.34; Wed, 04 Apr 2018 00:20:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=monom.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751216AbeDDHRN (ORCPT + 99 others); Wed, 4 Apr 2018 03:17:13 -0400 Received: from mail.monom.org ([188.138.9.77]:49480 "EHLO mail.monom.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750762AbeDDHRM (ORCPT ); Wed, 4 Apr 2018 03:17:12 -0400 Received: from mail.monom.org (localhost [127.0.0.1]) by filter.mynetwork.local (Postfix) with ESMTP id 2B238500B6A; Wed, 4 Apr 2018 09:17:10 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mail.monom.org X-Spam-Level: X-Spam-Status: No, score=-2.5 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=ham autolearn_force=no version=3.4.1 Received: from localhost (ppp-93-104-185-33.dynamic.mnet-online.de [93.104.185.33]) by mail.monom.org (Postfix) with ESMTPSA id 62D30500A56; Wed, 4 Apr 2018 09:17:09 +0200 (CEST) From: Daniel Wagner To: linux-kernel@vger.kernel.org Cc: linux-rt-users , Steven Rostedt , Thomas Gleixner , Carsten Emde , John Kacur , Paul Gortmaker , Julia Cartwright , Daniel Wagner , tom.zanussi@linux.intel.com, Daniel Wagner Subject: [PATCH RT 0/7] 4.4.126-rt141-rc1 Date: Wed, 4 Apr 2018 09:16:45 +0200 Message-Id: <20180404071652.24196-1-wagi@monom.org> X-Mailer: git-send-email 2.14.3 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Dear RT Folks, This is the RT stable review cycle of patch 4.4.126-rt141-rc1. The series contains a few patches which never made it to the v4.4-rt tree. I identified the patches using Steven's workflow. Next thing I try to do is to use Julia's script to idendtify missing patches. In theory nothing should be. Please scream at me if I messed something up. Please test the patches too. The pre-releases will not be pushed to the git repository, only the final release is. If all goes well, this patch will be converted to the next main release on 16.04.2017. Enjoy, -- Daniel ps: Bare with me, I didn't have time to get all the magic tooling working for releasing a -rc series as Steven has done in the past. That's why this mail looks slightly different then what you are used. Changes from 4.4.126-rt141: Daniel Wagner (1): Linux 4.4.126-rt141-rc1 Sebastian Andrzej Siewior (4): locking: add types.h mm/slub: close possible memory-leak in kmem_cache_alloc_bulk() arm*: disable NEON in kernel mode crypto: limit more FPU-enabled sections Steven Rostedt (VMware) (1): Revert "memcontrol: Prevent scheduling while atomic in cgroup code" Thomas Gleixner (1): timer: Invoke timer_start_debug() where it makes sense arch/arm/Kconfig | 2 +- arch/arm64/crypto/Kconfig | 14 +++++++------- arch/x86/crypto/camellia_aesni_avx2_glue.c | 20 ++++++++++++++++++++ arch/x86/crypto/camellia_aesni_avx_glue.c | 19 +++++++++++++++++++ arch/x86/crypto/cast6_avx_glue.c | 24 +++++++++++++++++++----- arch/x86/crypto/chacha20_glue.c | 8 +++++--- arch/x86/crypto/serpent_avx2_glue.c | 19 +++++++++++++++++++ arch/x86/crypto/serpent_avx_glue.c | 23 +++++++++++++++++++---- arch/x86/crypto/serpent_sse2_glue.c | 23 +++++++++++++++++++---- arch/x86/crypto/twofish_avx_glue.c | 27 +++++++++++++++++++++++++-- arch/x86/include/asm/fpu/api.h | 1 + arch/x86/kernel/fpu/core.c | 12 ++++++++++++ include/linux/spinlock_types_raw.h | 2 ++ kernel/time/timer.c | 4 ++-- localversion-rt | 2 +- mm/memcontrol.c | 7 ++----- mm/slub.c | 1 + 17 files changed, 174 insertions(+), 34 deletions(-) -- 2.14.3