Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2156560pxb; Fri, 5 Feb 2021 10:14:48 -0800 (PST) X-Google-Smtp-Source: ABdhPJyh4VglUJsoWXEK1QKU5z2blVdZlaRW/H84TbKmSlUFt9JqKn72LO4Hr5CI2oBcB8BD2XzL X-Received: by 2002:a17:906:a14e:: with SMTP id bu14mr5156544ejb.303.1612548888253; Fri, 05 Feb 2021 10:14:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612548888; cv=none; d=google.com; s=arc-20160816; b=q9RvVYEnqQT8smfFEYHumWLFRUQpyBCPYxw6Pk7ERTBGDF7ps+hfCi8oXm1XeM73k7 RliBASDF2AT9VSnoWKbm0odyCgfufZAFELCE57vFOOdQXFhtinhRfFp7Wv/VTQCCzV2u iJbu4T5fHoEbgLfU0QlnXafjqQC/ZtCr5ahBeXSlwfCXxZmLN0NNxZh+QinmfPo3By88 /YUsxDYSMztbfYpihXiPqZP2JxQtF3oMMtKz9JJTKsUsAt8ZRrBIHSyxST0lxSRoxB6F ljpUCiwZVXqbh+bxJQVYqJj/N1RKixAnvUz6qBVI5WzfSdRjhCJmkMgqsQ15DXHeZTg7 5eQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:message-id:date:subject:from; bh=G/O+O96UFtDkLhCx6VtAy7OC6wmIrJJaDoTgExjQBHU=; b=rwIh303N8kf7PwMp5AIOskZ3pMJlUzSQ9wmKIzfOKWPgzWVonN4fU7//EI8mMrX3Zt OBASpFAuR+eQWr37V6a4Wm3mLVgGWaUQLtPbbc7NBwIPn8bNwwg7wWSGFhvTjuHvxjQ9 FrqS0VAWKQ6ZfYGjsBVyK5CY5Cqj4NvVtK1UBmgGe/bRQ66KNxSodR1By0lsfQuvHxfn NE2nQXV35bAEqsYzjW+vk9Ll8osqYXMbHbQMgJAtBOrpPne0TqV47RWopqYXbDaX/waM SPpyrERfE7XpG40zNETK2BBuGZPs+Z4B6VdyBu1RnANEVhgrFyNekP6T2rA4L3r2HMu8 1U7w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v5si6209293eda.107.2021.02.05.10.14.22; Fri, 05 Feb 2021 10:14:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233590AbhBEQ2o (ORCPT + 99 others); Fri, 5 Feb 2021 11:28:44 -0500 Received: from mail.monom.org ([188.138.9.77]:60970 "EHLO mail.monom.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233711AbhBEQ0i (ORCPT ); Fri, 5 Feb 2021 11:26:38 -0500 Received: from mail.monom.org (localhost [127.0.0.1]) by filter.mynetwork.local (Postfix) with ESMTP id 2566150051D; Fri, 5 Feb 2021 19:08:02 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.monom.org X-Spam-Level: X-Spam-Status: No, score=-1.5 required=5.0 tests=ALL_TRUSTED,BAYES_00, PP_MIME_FAKE_ASCII_TEXT autolearn=no autolearn_force=no version=3.4.2 Received: from localhost (unknown [94.31.99.195]) by mail.monom.org (Postfix) with ESMTPSA id 779CD500182; Fri, 5 Feb 2021 19:08:01 +0100 (CET) From: Daniel Wagner Subject: [ANNOUNCE] 4.4.256-rt214 Date: Fri, 05 Feb 2021 18:01:50 -0000 Message-ID: <161254811056.21075.10011878796120213544@beryllium> To: LKML , linux-rt-users , Steven Rostedt , Thomas Gleixner , Carsten Emde , John Kacur , Sebastian Andrzej Siewior , Tom Zanussi , Clark Williams , Pavel Machek Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello RT-list! I'm pleased to announce the 4.4.256-rt214 stable release. This release is just an update to the new stable 4.4.256 version. GregKH writes: As was pointed out to us stable kernel maintainers last week, the overflow of the .y release number was going to happen soon, and our proposed solution for it (use 16 bits instead of 8), turns out to be breaking a userspace-visable api. As we can’t really break this, I did a release of the 4.4.256 and 4.9.256 releases today that contain nothing but a new version number. See the links for the full technical details if curious. Right now I’m asking that everyone who uses these older kernel releases to upgrade to this release, and do a full rebuild of their systems in order to see what might, or might not, break. If problems happen, please let us know on the stable@vger.kernel.org mailing list as soon as possible as I can only hold off on doing new stable releases for these branches for a single week only (i.e. February 12, 2021). http://www.kroah.com/log/blog/2021/02/05/8-bits-are-enough-for-a-version-number-dot-dot-dot/ You can get this release via the git tree at: git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git branch: v4.4-rt Head SHA1: cddea11550f1a2f0e8dd1c517bae4b76603e55d2 Or to build 4.4.256-rt214 directly, the following patches should be applied: https://www.kernel.org/pub/linux/kernel/v4.x/linux-4.4.tar.xz https://www.kernel.org/pub/linux/kernel/v4.x/patch-4.4.256.xz https://www.kernel.org/pub/linux/kernel/projects/rt/4.4/patch-4.4.256-rt214.patch.xz Enjoy! Daniel