Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp5602512rwd; Sun, 18 Jun 2023 15:25:50 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5agWIxRBA68u4+NVeWyzu+PSSIruAw+Uz0t7tnJMs79tSyLWgXBmhM3ivMBWHZDO09ySgf X-Received: by 2002:a05:6a20:548c:b0:11a:908:eab8 with SMTP id i12-20020a056a20548c00b0011a0908eab8mr12935936pzk.53.1687127150449; Sun, 18 Jun 2023 15:25:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687127150; cv=none; d=google.com; s=arc-20160816; b=E3/wXOG7q2MqSrxuokU4FARrQW17z9J80/FgCHOtieuR10X+eP33HZUHpdFh5/1oC3 JjVxiuNMSmLbt342dTRMA87yKB8XxjTaLF3PHBeodQiL3qGqcH5Ym3TDdNH0ilPjJ3Gp 60RbWe8kj8fPErgo9GG6zJnvQCXW284O+nwFo+JkvW/JOxvIJ9CCxbKrG/sDbiH8OIzP b8kh3E0hJpuSpbDK11reokPar2VXeXDvigwe34eDSMsQ+dm7yW4QMPe0x2r3K4AxK3rA bw8vpCELPGV+U/W1xrQF4O6xL0GIzymwGGlMXjG6XiyKUNEst+QbIHU/zJFinbC1YoXn 9xCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:to:from:date:dkim-signature; bh=wZLdjHcab2BcEUayDGFasfyZtj2UYXOAR0yUXAOl+LM=; b=S+EtqsZqlaUidECQIFc81CHhBx5LpRB62fs+MtpxEdEuhRq7C43aX/89kNSEl7GDC2 1w3T7n75TDBPERBD9xrqSlYBFCDSV1l0JIGj0jLpQp5opNtUZ07E2wAsyuutiWO4fsam HnQ5Lb2POvQ9pLx0PjUwFgd9V4449ZIehT81xYczF1BNbSm3fQtGfER0wSxI1n0mPGeq 91zEkY7C6Ml5QsL3RW8pGeYnKWVcGUh2TPabILE+6XywaQmkPQ8T7wWZvFF/9i68WkjO qP8atpY9jhqPRRBB/1bOcxqCSnzoiVNmEDaq80whWRIvH5vSnJTpY4flW8GawZuzwRq0 ktsA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=EwRF4DsW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s18-20020a639252000000b0055381e05234si5584028pgn.489.2023.06.18.15.25.36; Sun, 18 Jun 2023 15:25:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=EwRF4DsW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229580AbjFRVwq (ORCPT + 99 others); Sun, 18 Jun 2023 17:52:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39822 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229560AbjFRVwp (ORCPT ); Sun, 18 Jun 2023 17:52:45 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 89BC7113 for ; Sun, 18 Jun 2023 14:52:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1687125119; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type; bh=wZLdjHcab2BcEUayDGFasfyZtj2UYXOAR0yUXAOl+LM=; b=EwRF4DsW7rKDoSMT1DjDdC3WnF91zmdB0JMvADBy8lbJoDhJ9N0xFFgzlaIDi95EMhgJH9 OxiX2xXdqbKwY7Ovq3+/O9nAo6Nx65ZnxQeaViYZk7yke42buAgHXtZnmKserSae18DXYQ wG8QYO+fo7Da9/ScZNx6ttJ4PETLf2Y= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-300-2SUG0_mZO4qACebW0T-EiA-1; Sun, 18 Jun 2023 17:51:55 -0400 X-MC-Unique: 2SUG0_mZO4qACebW0T-EiA-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.rdu2.redhat.com [10.11.54.8]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 83B7338035A6; Sun, 18 Jun 2023 21:51:54 +0000 (UTC) Received: from localhost (unknown [10.22.8.8]) by smtp.corp.redhat.com (Postfix) with ESMTP id A75D9C1603B; Sun, 18 Jun 2023 21:51:53 +0000 (UTC) Date: Sun, 18 Jun 2023 18:51:52 -0300 From: "Luis Claudio R. Goncalves" To: LKML , linux-rt-users , stable-rt , Steven Rostedt , Thomas Gleixner , Carsten Emde , Sebastian Andrzej Siewior , Daniel Wagner , Tom Zanussi , Clark Williams , Mark Gross , Pavel Machek , Jeff Brady , Luis Goncalves Subject: [ANNOUNCE] 5.10.180-rt89 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Scanned-By: MIMEDefang 3.1 on 10.11.54.8 X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello RT-list! I'm pleased to announce the 5.10.180-rt89 stable release. This release is a RT-only update. All the changes here are specific to RT. You can get this release via the git tree at: git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git branch: v5.10-rt Head SHA1: cb0ca150b57efd9e879e56c8f9834d98182aa394 Or to build 5.10.180-rt89 directly, the following patches should be applied: https://www.kernel.org/pub/linux/kernel/v5.x/linux-5.10.tar.xz https://www.kernel.org/pub/linux/kernel/v5.x/patch-5.10.180.xz https://www.kernel.org/pub/linux/kernel/projects/rt/5.10/older/patch-5.10.180-rt89.patch.xz Signing key fingerprint: 9354 0649 9972 8D31 D464 D140 F394 A423 F8E6 7C26 All keys used for the above files and repositories can be found on the following git repository: git://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git Testing performed under the tag v5.10.180-rt89-rc1 at: https://linux.kernelci.org/test/job/rt-stable/branch/v5.10-rt-next/kernel/v5.10.180-rt89-rc1/ Enjoy! Luis Changes from v5.10.180-rt88: --- Luis Claudio R. Goncalves (3): Revert "printk: declare printk_deferred_{enter,safe}() in include/linux/printk.h" Revert "mm/page_alloc: fix potential deadlock on zonelist_update_seqseqlock" Linux 5.10.180-rt89 --- include/linux/printk.h | 19 ------------------- localversion-rt | 2 +- mm/page_alloc.c | 14 -------------- 3 files changed, 1 insertion(+), 34 deletions(-) --- diff --git a/include/linux/printk.h b/include/linux/printk.h index 92e0656841128..7e4352467d831 100644 --- a/include/linux/printk.h +++ b/include/linux/printk.h @@ -609,23 +609,4 @@ static inline void print_hex_dump_debug(const char *prefix_str, int prefix_type, #define print_hex_dump_bytes(prefix_str, prefix_type, buf, len) \ print_hex_dump_debug(prefix_str, prefix_type, 16, 1, buf, len, true) -#if defined(CONFIG_PRINTK) && !defined(CONFIG_PREEMPT_RT) -extern void __printk_safe_enter(void); -extern void __printk_safe_exit(void); -/* - * The printk_deferred_enter/exit macros are available only as a hack for - * some code paths that need to defer all printk console printing. Interrupts - * must be disabled for the deferred duration. - */ -#define printk_deferred_enter __printk_safe_enter -#define printk_deferred_exit __printk_safe_exit -#else /* defined(CONFIG_PRINTK) && !defined(CONFIG_PREEMPT_RT) */ -static inline void printk_deferred_enter(void) -{ -} -static inline void printk_deferred_exit(void) -{ -} -#endif - #endif diff --git a/localversion-rt b/localversion-rt index 666227d921a3d..d2a40223e4b77 100644 --- a/localversion-rt +++ b/localversion-rt @@ -1 +1 @@ --rt88 +-rt89 diff --git a/mm/page_alloc.c b/mm/page_alloc.c index 7e65e3ef16e3a..3760a06932a6e 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -6043,20 +6043,7 @@ static void __build_all_zonelists(void *data) int nid; int __maybe_unused cpu; pg_data_t *self = data; - unsigned long flags; - /* - * Explicitly disable this CPU's interrupts before taking seqlock - * to prevent any IRQ handler from calling into the page allocator - * (e.g. GFP_ATOMIC) that could hit zonelist_iter_begin and livelock. - */ - local_irq_save(flags); - /* - * Explicitly disable this CPU's synchronous printk() before taking - * seqlock to prevent any printk() from trying to hold port->lock, for - * tty_insert_flip_string_and_push_buffer() on other CPU might be - * calling kmalloc(GFP_ATOMIC | __GFP_NOWARN) with port->lock held. - */ write_seqlock(&zonelist_update_seq); #ifdef CONFIG_NUMA @@ -6091,7 +6078,6 @@ static void __build_all_zonelists(void *data) } write_sequnlock(&zonelist_update_seq); - local_irq_restore(flags); } static noinline void __init