Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp415705ybt; Sat, 13 Jun 2020 08:27:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwbYqLMgFflHH+VfpXynUxYzDL8mMYWDmA32ZR5khVyIkcO/VnB1+nfgHrWzx7HYvy2uRO4 X-Received: by 2002:a17:906:c058:: with SMTP id bm24mr17644158ejb.73.1592062050765; Sat, 13 Jun 2020 08:27:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592062050; cv=none; d=google.com; s=arc-20160816; b=ymPsNltiaRe5vJ59vLuZF2B+RTrJCx/SNlR5k8gfFnTaHHd5i6uOUotXmLXEV79t0P jo3w5tiBEbmRMfnwUKsYssGYWzFimqIUk/e+lN3GrlS5cXSaobxjKKbn8EhEl0DzHNEK aEcZg/NJ1w9+JuV2MCDNSTymsGDjLrY05UMav7iwdNDOYb2ZLfEeRJJS/ah1JZrMIIlW y4hy9z8s198WageMtd2FSWA4fLHTQ3w2BvcH7BV01R8pnyxVWE5ekS26yHUTlK4fqj6G d0pi/8qZ8hgadR9CJd7CSI2CBAeyjI6NDZaJCPAOdOuuao0p31PLTnQPVRNv8Ji0E4eN 1KcA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:message-id:date:subject:from; bh=1ec9YaIhqjzVPOqppZn1MTpAqz6h2rzbZgvy70KBe7Q=; b=j4WVWhI+f542f74ZHlNIjMu1AgWbzjXqnamqA7Oyw3/K93A8yI/wJ8XdfLZNiR3o3M 7qqpnhtMjOAhBHpXN9eYeAaSEB9NcSKeao0XobH4L040lPg148wvQm6WQfvlTmf3Ng6/ +KYEe/5j+PHG74J/QrTYD+qEwG8+MqbcoxQKe+i5IDPJHFtC6b5WL8TbH0oOcV7XTPfg uvgpzyU+uWr6mr53e4KuWREp+Zo5zqPZoj94thz+GQziEucwMV/EuPthlYxlSLLhgVen +8jN25vgIOWsPBDWblOnCyi8aLhcMcKymNGXdR5dxt/pnEcc5wWCRUiEMNFDzm/EqPNj 5beg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o19si5915861eja.256.2020.06.13.08.27.08; Sat, 13 Jun 2020 08:27:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726500AbgFMPZP (ORCPT + 99 others); Sat, 13 Jun 2020 11:25:15 -0400 Received: from mail.kernel.org ([198.145.29.99]:36908 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726361AbgFMPZP (ORCPT ); Sat, 13 Jun 2020 11:25:15 -0400 Received: from localhost (173-25-40-8.client.mchsi.com [173.25.40.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E2DC6206B7; Sat, 13 Jun 2020 15:25:14 +0000 (UTC) From: Clark Williams Subject: [ANNOUNCE] 4.14.184-rt84 Date: Sat, 13 Jun 2020 15:22:02 -0000 Message-ID: <159206172278.1098109.8375845910679325527@theseus.lan> To: LKML , linux-rt-users , Steven Rostedt , Thomas Gleixner , Carsten Emde , John Kacur , Sebastian Andrzej Siewior , Daniel Wagner , Tom Zanussi , Clark Williams Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello RT-list! I'm pleased to announce the 4.14.184-rt84 stable release. In addition to the 4.14.184 stable release merge, this release contains the following three RT fixes: 5bba64129745 tasklet: Address a race resulting in double-enqueue 886fa0cf47d6 mm: slub: Always flush the delayed empty slubs in flush_all() 8500870d1580 fs/dcache: Include swait.h header You can get this release via the git tree at: git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git branch: v4.14-rt Head SHA1: 7c010a975cdc47eba4341b50e6262aa5fb53c17e Or to build 4.14.184-rt84 directly, the following patches should be applied: https://www.kernel.org/pub/linux/kernel/v4.x/linux-4.14.tar.xz https://www.kernel.org/pub/linux/kernel/v4.x/patch-4.14.184.xz https://www.kernel.org/pub/linux/kernel/projects/rt/4.14/patch-4.14.184-rt84.patch.xz You can also build from 4.14.183-rt83 by applying the incremental patch: https://www.kernel.org/pub/linux/kernel/projects/rt/4.14/incr/patch-4.14.183-rt83-rt84.patch.xz Enjoy! Clark