Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp306560rwd; Wed, 31 May 2023 23:58:35 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7LMvZIbhiT8bJ/ZXM8pob3nTkQknk163w9fEMVzxuX9LyOn/Fne92GPNZBBCb27V12dJBt X-Received: by 2002:a05:622a:1303:b0:3f5:19e4:34ce with SMTP id v3-20020a05622a130300b003f519e434cemr8777464qtk.48.1685602715302; Wed, 31 May 2023 23:58:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685602715; cv=none; d=google.com; s=arc-20160816; b=Ex03u4zovHV+I/mDGULTC6sjruYmFQ3gqzMU+LDCcSg7sN2eokSNOdwSw4rw6encc8 mmkqfoiVuYN1CHK2RfsWNpLcMSE6qSlM+u4N+2QyQeW/1RfjAHEbEQX7ka02UDmu+7Kh 9KKN2g0JrqE9Hq95F4lwKGhnrcIOeUwo4AaDi+GQnMsmyp0xZuzAGHvKk5ibkbAhv+xo TM4BZOSqRjWkccmIFc3e9pJ3upuSlkCvE0XZuKc5yk0MaD1E8iH/zVZf4ZiLef9ycQB+ VmPkJYKVB6Y8l24+gkJNA48hqVosTSImX9ZW7+A7C3jUP8llyJPRj/aBzkMPVF2I7alo p7EQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:to:from:date:dkim-signature; bh=twcsBfOjTDpVh6VIpSdBFhZaRFo+zWZG1bGrflkWktg=; b=JRhIFBJk3iIwtpqQ7UGB/YlBQDpFvgMKgYoCY+umXlOPAwh2Kg0VjHW247I9T99T3m h+mmb/Y7DMgMP9GJ0eN69mNYR9ySnrlr88EqNKfDUBQuOpL28pzfkT9ev6M9euRg5D5m ltlT/qhRVW64O3hg2zh4EgaJGG2cmJJHws9xA2GCSEbMY/WQ08dSwYsSflbQXUbF6Pj8 39sBPwjy21+CsV20Zt4A1dWGDmvHhR5YTOAlHkJQNrYHFFHGs6b50F1L8eBCc0pUmU7t cwAZIX1FDxZc4mEkKTj09P8/ZbFzBFgO9N4iCvWb3NH+bYAsw42kJDEUyqoj0hH7CdYG jcRw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@monom.org header.s=dkim header.b=HQbf85Ed; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=monom.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c74-20020a63354d000000b0053ef469281bsi2309029pga.474.2023.05.31.23.58.22; Wed, 31 May 2023 23:58:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@monom.org header.s=dkim header.b=HQbf85Ed; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=monom.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231833AbjFAGkT (ORCPT + 99 others); Thu, 1 Jun 2023 02:40:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51826 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231806AbjFAGkN (ORCPT ); Thu, 1 Jun 2023 02:40:13 -0400 X-Greylist: delayed 600 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Wed, 31 May 2023 23:40:11 PDT Received: from mail.nearlyone.de (mail.nearlyone.de [49.12.199.46]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 90E72133; Wed, 31 May 2023 23:40:11 -0700 (PDT) Received: from [127.0.0.1] (localhost [127.0.0.1]) by localhost (Mailerdaemon) with ESMTPSA id 38E05DE5F8; Thu, 1 Jun 2023 08:21:21 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=monom.org; s=dkim; t=1685600486; h=from:subject:date:message-id:to:mime-version:content-type; bh=twcsBfOjTDpVh6VIpSdBFhZaRFo+zWZG1bGrflkWktg=; b=HQbf85Edrn0Hf5mO8LxC3BoiiOAAI16XHr2BZse7yz6bZXLjYnU1Lyn58z2TC53Ldns2jX zPzHhypvbqa7th7CXrpfuoHNnVaX9wgvqN4ek8MTzIDcEoK2XcKa+iyfYLhAhmWX4a9cKa MCrFmL27xKQuYhY+cAFdBlX8VEZE1TNYYVvtCLhB5p89F9W9CgpLfTIhwAX6DzC6EuPvFb 6ySIW28Ueb0XgoI2inJavdEJzxkid96WcX8ViNpE38WJMO6+42O0USJ+QoMMK+wWkPEq/O sCwerYWuWbcORGMX/KaWAzLul3tsopaj7x02ael5n+JC+O1chbNn1SpWg/gL0A== Date: Thu, 1 Jun 2023 08:21:18 +0200 From: Daniel Wagner To: LKML , linux-rt-users@vger.kernel.org, stable-rt@vger.kernel.org, Steven Rostedt , Thomas Gleixner , Sebastian Andrzej Siewior , Tom Zanussi , Clark Williams Subject: [ANNOUNCE] 4.19.283-rt124 Message-ID: <168560023269.6872.4317883590813798706@beryllium.lan> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Last-TLS-Session-Version: TLSv1.3 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello RT-list! I'm pleased to announce the 4.19.283-rt124 stable release. This is just an updating to the 4.19.283 stable release, no RT specific changes. You can get this release via the git tree at: git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git branch: v4.19-rt Head SHA1: 667d7f30ea873d10dc49365c95a387018da5961a Or to build 4.19.283-rt124 directly, the following patches should be applied: https://www.kernel.org/pub/linux/kernel/v4.x/linux-4.19.tar.xz https://www.kernel.org/pub/linux/kernel/v4.x/patch-4.19.283.xz https://www.kernel.org/pub/linux/kernel/projects/rt/4.19/older/patch-4.19.283-rt124.patch.xz Signing key fingerprint: 5BF6 7BC5 0826 72CA BB45 ACAE 587C 5ECA 5D0A 306C All keys used for the above files and repositories can be found on the following git repository: git://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git Enjoy! Daniel Changes from v4.19.280-rt123: --- $ git diff 01355ace5b6eb7a7b153182438bb0667d682b284 v4.19.283 v4.19.280-rt123 diff --cc lib/debugobjects.c index 5f23d896df55,e28481c402ae..e486693aea49 --- a/lib/debugobjects.c +++ b/lib/debugobjects.c @@@ -421,55 -368,6 +421,55 @@@ static void debug_object_is_on_stack(vo WARN_ON(1); } +static struct debug_obj *lookup_object_or_alloc(void *addr, struct debug_bucket *b, + struct debug_obj_descr *descr, + bool onstack, bool alloc_ifstatic) +{ + struct debug_obj *obj = lookup_object(addr, b); + enum debug_obj_state state = ODEBUG_STATE_NONE; + + if (likely(obj)) + return obj; + + /* + * debug_object_init() unconditionally allocates untracked + * objects. It does not matter whether it is a static object or + * not. + * + * debug_object_assert_init() and debug_object_activate() allow + * allocation only if the descriptor callback confirms that the + * object is static and considered initialized. For non-static + * objects the allocation needs to be done from the fixup callback. + */ + if (unlikely(alloc_ifstatic)) { + if (!descr->is_static_object || !descr->is_static_object(addr)) + return ERR_PTR(-ENOENT); + /* Statically allocated objects are considered initialized */ + state = ODEBUG_STATE_INIT; + } + + obj = alloc_object(addr, b, descr); + if (likely(obj)) { + obj->state = state; + debug_object_is_on_stack(addr, onstack); + return obj; + } + + /* Out of memory. Do the cleanup outside of the locked region */ + debug_objects_enabled = 0; + return NULL; +} + +static void debug_objects_fill_pool(void) +{ + /* + * On RT enabled kernels the pool refill must happen in preemptible + * context: + */ - if (!IS_ENABLED(CONFIG_PREEMPT_RT) || preemptible()) ++ if (!IS_ENABLED(CONFIG_PREEMPT_RT_FULL) || preemptible()) + fill_pool(); +} + static void __debug_object_init(void *addr, struct debug_obj_descr *descr, int onstack) {