Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp746735pxp; Fri, 11 Mar 2022 14:03:54 -0800 (PST) X-Google-Smtp-Source: ABdhPJxL3jqXMfxylN2vCF8YvZXvUHPhOnaqwF6PNEL5vrpXrMfdIRKH9C8y2ME+cRTspCnJx87Z X-Received: by 2002:a17:902:6904:b0:14b:416a:a2c0 with SMTP id j4-20020a170902690400b0014b416aa2c0mr12627087plk.14.1647036234276; Fri, 11 Mar 2022 14:03:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1647036234; cv=none; d=google.com; s=arc-20160816; b=JWKjM851d0caTsVA7LYNZxDlTk+7P45/cakt6ps65xJJ1dBloBNN6lCdRw2I7Mmx8+ k9lyK7G0jdSC1/jn8lI9J0sV2Mg2wxLZQ72EPySZDDXCdnwiYR2gkvWHwiCzw1GY/OB7 nYrnmvHExfULGRqK/j6UByAUjBKjUwFkLWW1rVZ8+eJjDOp6cn1NoalGP7E1VOuT4j1l Kv67QqQnManAsymdokeOG7M0N5iPhigNw2jy7F2BlohfcuzE+3amL5RODNVyQImxqPda ZftG59QboKQVWVIzXfca3zA2Brb98Enq9tqF2LHuKcIKXGtB376fubNXhzrLrGv4bj6y ximg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:to:from:date:dkim-signature; bh=5RPKCM0lEg804VClGL4CVuzIW9F3xMPb2KUhtOXX3OU=; b=mvpgXvMD+bserwLAdV4HavL+Cw8sl8AUBFM/EUQlXqsXU+k6lLe/AAloOYvIaREl1/ Nl9aaSRIASarZrfj+/qGqE2w/4OMUOIvkyEQNFdrgYkD6HtLc2wiF1O7X7PSnhrGS6B3 8x0lBpU9w0ndNvMb1grntfBwjld+ngzULUgy/PrWoAIHS18KkG/UQ6CGvhrVEBszo/uh KbvgmE6IHWP48KwqwEhiFxw8KqrebZD+lyEeqgV6GnfAZ+8IAXG1TpaFLzrzCsMIV3L2 goE66wBJtWNfTyFIm8TRQpWzwPOTlJM/W0oHYlMoZsNSU39g5kBLlIcZS8hI5UgAyuTK zZHQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=EYv4B0IT; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id q14-20020a17090311ce00b001517d6bd6f8si10811493plh.533.2022.03.11.14.03.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 11 Mar 2022 14:03:54 -0800 (PST) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=EYv4B0IT; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id A660128573A; Fri, 11 Mar 2022 13:19:07 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344513AbiCJWsG (ORCPT + 99 others); Thu, 10 Mar 2022 17:48:06 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34722 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344516AbiCJWsC (ORCPT ); Thu, 10 Mar 2022 17:48:02 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 81D48190C2E for ; Thu, 10 Mar 2022 14:47:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1646952420; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type; bh=5RPKCM0lEg804VClGL4CVuzIW9F3xMPb2KUhtOXX3OU=; b=EYv4B0ITi4t9vJkl9VNhBncpoG4TGiIuM+BTSfM0rdruKK/5TWrKm0tQeWQTnh52x9A9yy spunl1MbRT86dSQ1hS1hjDbOFzcAt+fQyAB5QznX3XrnVLQa+gYVPXM0XU8TkDxSTB8nCi Xo2LTekImQdR3lQ5jHEz2YWz2piYZrQ= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-664-6PvtaaVyMVuXa87gqAps2w-1; Thu, 10 Mar 2022 17:46:57 -0500 X-MC-Unique: 6PvtaaVyMVuXa87gqAps2w-1 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 42D161006AA5; Thu, 10 Mar 2022 22:46:55 +0000 (UTC) Received: from localhost (unknown [10.22.9.69]) by smtp.corp.redhat.com (Postfix) with ESMTP id 1C30C4CEEE; Thu, 10 Mar 2022 22:46:53 +0000 (UTC) Date: Thu, 10 Mar 2022 19:46:52 -0300 From: "Luis Claudio R. Goncalves" To: LKML , linux-rt-users , stable-rt , Steven Rostedt , Thomas Gleixner , Carsten Emde , Sebastian Andrzej Siewior , Daniel Wagner , Tom Zanussi , Clark Williams , Mark Gross , Pavel Machek , Jeff Brady , Luis Goncalves Subject: [ANNOUNCE] 5.10.104-rt63 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Spam-Status: No, score=-2.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello RT-list! I'm pleased to announce the 5.10.104-rt63 stable release. This release is just an update to the new stable 5.10.104 version and no RT specific changes have been made. You can get this release via the git tree at: git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git branch: v5.10-rt Head SHA1: 25351c7de42560c8de93eaaef03c722942c13038 Or to build 5.10.104-rt63 directly, the following patches should be applied: https://www.kernel.org/pub/linux/kernel/v5.x/linux-5.10.tar.xz https://www.kernel.org/pub/linux/kernel/v5.x/patch-5.10.104.xz https://www.kernel.org/pub/linux/kernel/projects/rt/5.10/patch-5.10.104-rt63.patch.xz All keys used for the uploads can be found on the following git repository: git://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git Enjoy! Luis