Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp2327406pxf; Sat, 20 Mar 2021 11:47:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxs3c9beE9y3JA+zXAV5Jz6KZVEjKWVa3Sdy3wCZD6mMqKx0KRWzC4+awcFvfReWBQ0K1SB X-Received: by 2002:a05:6402:4415:: with SMTP id y21mr16499847eda.70.1616266050552; Sat, 20 Mar 2021 11:47:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616266050; cv=none; d=google.com; s=arc-20160816; b=G+CKp5Sxlr6LTKVGUSkyBYtVvUHFFOZ8a1evO+Zy/NO9NjW4X6dFVBG+pd/2zDPENC WVOqxFYXCNjkCi/FrLRKQHjvMNNeS9EV6Pttqzl8H4Qo403sj9iM8fAn+G1VA9d7jZ65 fd4lvdU8S3cDBBWNm8OGs26JarolkT3RdP9HJ8aScZ/C+hGqW05wyWbxrJWM49VviELN pN1exHXe/YV5BIVHOx6MWC49p+PTJojqv8Z3AYUXS4iB7Nr7Hr9Y/KrfmJim8KXC8fpS 6WVuIZ9/LQSg7w6mVXWb1tn+ZrkA2Erj6Ba5EbLUyPkFgnLmKKUxn5TbJANtOFIlaIkJ o2CA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:message-id:date:subject:from; bh=IKyhNjjqzxhjVYCafiMYZI4bPE7KnOw7M6lV02VeuiY=; b=Ki/ZZwJVh0lB2WtvU8Yt97+SYPVNAPUSfMm+VVwe0J0KAnbtBmizqKZK6i/aeyTBqj VDNz97KYdFL1ZPd1QbYB7XbLYBi/9ablcGMUL4IbpEVEGopgh9Qg33tDkIILh4tu7FDF Mpa9nMYECZryK2E0BtpIJCw1k/lrjPfSWOeFlyM5cjwNzhPfZ9HO1uU0EV2cqFhn5zCC dyNa11u9WwbX5aIYscqfR3Qq0S6PfLs9e9gZVgrYOQ/1HGwmYEPn+7npeeUcjFqqu373 M8t0Jd5Zy3goapVb+x4x7AHd9XSN7E0YigdmULNp3uZBo/kzUv1QWsomx0mv2/B77GSa kkNQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t10si7059150edq.420.2021.03.20.11.47.08; Sat, 20 Mar 2021 11:47:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230028AbhCTSnU (ORCPT + 99 others); Sat, 20 Mar 2021 14:43:20 -0400 Received: from mail.monom.org ([188.138.9.77]:50866 "EHLO mail.monom.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229854AbhCTSmr (ORCPT ); Sat, 20 Mar 2021 14:42:47 -0400 Received: from mail.monom.org (localhost [127.0.0.1]) by filter.mynetwork.local (Postfix) with ESMTP id 62EAE50035C; Sat, 20 Mar 2021 19:42:45 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.monom.org X-Spam-Level: X-Spam-Status: No, score=-2.5 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=ham autolearn_force=no version=3.4.2 Received: from localhost (unknown [94.31.96.195]) by mail.monom.org (Postfix) with ESMTPSA id 97B85500328; Sat, 20 Mar 2021 19:42:44 +0100 (CET) From: Daniel Wagner Subject: [ANNOUNCE] 4.4.262-rt219 Date: Sat, 20 Mar 2021 16:25:35 -0000 Message-ID: <161625753552.20205.6230905513724868931@beryllium> To: LKML , linux-rt-users , Steven Rostedt , Thomas Gleixner , Carsten Emde , John Kacur , Sebastian Andrzej Siewior , Tom Zanussi , Clark Williams , Pavel Machek Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello RT-list! I'm pleased to announce the 4.4.262-rt219 stable release. This is just an update to the latest stable release. No RT specific changes. I tried to fix the locking self failures I reported last time. As it turns out the test setup was somehow broken. After redoing all the test just using 'defconfig + kvmconfig + locking_selftest' all worked fine. I also tested older v4.4-rt releases and there was no failures. Furthermore, the cyclicdeadline fails again, which I probably a good thing; I don't believe in self healing capabilities of the -rt patchset. Anyway, I think my build/test setup was just broken. Known issue: - locktorture reports a might_sleep warning for spin_locks test You can get this release via the git tree at: git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git branch: v4.4-rt Head SHA1: d18d08f6afe25c27207d26a9811e23abf7ef36b8 Or to build 4.4.262-rt219 directly, the following patches should be applied: https://www.kernel.org/pub/linux/kernel/v4.x/linux-4.4.tar.xz https://www.kernel.org/pub/linux/kernel/v4.x/patch-4.4.262.xz https://www.kernel.org/pub/linux/kernel/projects/rt/4.4/patch-4.4.262-rt219.patch.xz Enjoy! Daniel