Received: by 2002:a05:7412:251c:b0:e2:908c:2ebd with SMTP id w28csp2092590rda; Tue, 24 Oct 2023 12:03:42 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFaz84HjwJSk4XA/nF6ZT6j4qUoBvG0j+vjRHCdqRJlA15z1bMNngtRdfmxXhzdpwf1kHzA X-Received: by 2002:a05:6a20:7486:b0:17a:de5d:1d7e with SMTP id p6-20020a056a20748600b0017ade5d1d7emr3832222pzd.55.1698174222428; Tue, 24 Oct 2023 12:03:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698174222; cv=none; d=google.com; s=arc-20160816; b=O/3XOFAsQfmbV0b8nnHbW0s0vzv6ULnPnXzq7sSmHaPhC5w1kSMVFWG8DwnSxxTyQZ V/NhfCq8Rey7yp7YQrPlw5QlBPwA6iW/6tENwCMEk8XYkWLDZkMFSYdajO0U+2slZ9JQ c7tApxzOxouU2HarckzQH+C6EsrGvurCW17pld+uzm3po5uzbElik8wqTgoBrq95e3Zj 0Vj2N/kG5ctK8Ywg49zbUQE0Wqu9A0RWXIqlD91biFmg4ucGAFXk10s2KGToPa3cjF/g v7C0NjnH5uHv2q8pOOBlvXOY9iA4SJTtisbis4nAgPDaIVfLIQxWtjbuNrBq8Vg/UFUF 7dAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:message-id:date:subject:from:dkim-signature; bh=cbPoRubtoHbBGltcYS5RKLVYKlncvYyNUHrVbuFLjXc=; fh=W/r0zOUngbQr0EFsC4cPaRKXU3E0PsfHJq82crJVkhs=; b=VgZNSvM4p98AolqCtDW9M2YE4LYCz0KAZNojc8/pt76gkcEu8wY7u1w6NZtHz2eNz1 L2pRABf+xEwzM62inlWmOkGEG+dkdbmYKSEH6o3enN2jOqNrU7c3eIgX/x5aNyXXiCcp Oq+q8H/9xRmwLm/4bVsndeSAaeD/gxv4DfnciBop6oyZB2MRLxlQ/JyglntbfRovp7Kq f1yV2jY1tTu5YXq0wrzDoUhPvLpviyQL49vZlkfeh0xU4zzgNBcaEvZWyO0F1JTtRXm2 FuDbxv4GlAZNOhXXhgnwEoULeyzgD5fdYZ/RoAznP/o/So7G3Yf9uFFDs/wP0dFN3e0e eLVQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@canonical.com header.s=20210705 header.b=TBQxF8R9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from fry.vger.email (fry.vger.email. [2620:137:e000::3:8]) by mx.google.com with ESMTPS id z128-20020a633386000000b005ac50a019b2si8642549pgz.766.2023.10.24.12.03.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 24 Oct 2023 12:03:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) client-ip=2620:137:e000::3:8; Authentication-Results: mx.google.com; dkim=fail header.i=@canonical.com header.s=20210705 header.b=TBQxF8R9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 24C778021779; Tue, 24 Oct 2023 12:03:39 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343935AbjJXTDa (ORCPT + 99 others); Tue, 24 Oct 2023 15:03:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58186 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234846AbjJXTD2 (ORCPT ); Tue, 24 Oct 2023 15:03:28 -0400 Received: from smtp-relay-canonical-1.canonical.com (smtp-relay-canonical-1.canonical.com [185.125.188.121]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 696F110C3; Tue, 24 Oct 2023 12:03:26 -0700 (PDT) Received: from canonical.com (1.general.jsalisbury.us.vpn [10.172.66.188]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-canonical-1.canonical.com (Postfix) with ESMTPSA id D308E3FB9C; Tue, 24 Oct 2023 19:03:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1698174204; bh=cbPoRubtoHbBGltcYS5RKLVYKlncvYyNUHrVbuFLjXc=; h=From:Subject:Date:Message-ID:To; b=TBQxF8R9VNYFWJclidnAq513PlEDTRmLfTFgRwANNckcVKjHJG+dCqIF6Yvm7fCJt qMXNwWqWBjKD7x2JF5SQKV8cxJ75s072OO0LcUcUbwnNeG6mbP5sEH7xhGkCov8tJd MZP9C6gi47hrVoEYk7AAMPED88mp4Ip8cl6LY5c6YmE3z8lGmH4/7ANnIhvMYAC7dt YyJ/qGB/d8C+5pCdSP5TNuJ+IMgi4cZ89UflhEkhuBAwt0x82VE9clxNtTBse3uKHI j3wAf0TElvIz2Sng8umZpr4khveVbqK42h9Zm6eWrHTN+hIveBSFESKSkswtZsCGUi Z/Xw4DzZmEFBQ== From: Joseph Salisbury Subject: [ANNOUNCE] 5.15.133-rt70 Date: Tue, 24 Oct 2023 18:56:13 -0000 Message-ID: <169817377329.1028379.7397120764831029877@jupiter.home.arpa> To: LKML , linux-rt-users , Steven Rostedt , Thomas Gleixner , Carsten Emde , John Kacur , Sebastian Andrzej Siewior , Daniel Wagner , Tom Zanussi , Clark Williams , Pavel Machek , Joseph Salisbury X-Spam-Status: No, score=-0.6 required=5.0 tests=DKIM_INVALID,DKIM_SIGNED, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Tue, 24 Oct 2023 12:03:39 -0700 (PDT) Hello RT-list! I'm pleased to announce the 5.15.133-rt70 stable release. Note that this is strictly changes to PREEMPT_RT behavior with the following commits: ea14d5391ab6 drm/i915: Do not disable preemption for resets 23b43390beed posix-timers: Ensure timer ID search-loop limit is valid 33390dbc8270 bpf: Remove in_atomic() from bpf_link_put(). 83098c4ddc86 mm/page_alloc: Use write_seqlock_irqsave() instead write_seqlock() + local_irq_save(). 08d5582b4fad locking/seqlock: Do the lockdep annotation before locking in do_write_seqcount_begin_nested() 2f43c8cdd66e sched: avoid false lockdep splat in put_task_struct() 087228e58a7f debugobjects,locking: Annotate debug_object_fill_pool() wait type violation 2139bd98f2d2 debugobject: Ensure pool refill (again) 953acf822668 Revert "softirq: Let ksoftirqd do its job" 108971fa0a8e locking/rwbase: Mitigate indefinite writer starvation f2a15c7f3231 io-mapping: don't disable preempt on RT in io_mapping_map_atomic_wc(). You can get this release via the git tree at: git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git branch: v5.15-rt Head SHA1: 2c1b5deb5b48082f07576d177ebf458e3798e85e Or to build 5.15.133-rt70 directly, the following patches should be applied: https://www.kernel.org/pub/linux/kernel/v5.x/linux-5.15.tar.xz https://www.kernel.org/pub/linux/kernel/v5.x/patch-5.15.133.xz https://www.kernel.org/pub/linux/kernel/projects/rt/5.15/patch-5.15.133-rt70.patch.xz Enjoy! Joseph Salisbury