Received: by 2002:a05:7412:40d:b0:e2:908c:2ebd with SMTP id 13csp1095639rdf; Wed, 22 Nov 2023 05:39:16 -0800 (PST) X-Google-Smtp-Source: AGHT+IE9oemhkKj516G9xtYxqK31tGodbg+nqR5PtFr/fWJnYm7NvFyT4xCL7Qfy6ZUBbgTol5lj X-Received: by 2002:a17:902:6a89:b0:1cc:5674:9184 with SMTP id n9-20020a1709026a8900b001cc56749184mr2220042plk.31.1700660355646; Wed, 22 Nov 2023 05:39:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700660355; cv=none; d=google.com; s=arc-20160816; b=N9H/pjDUGSbgxqLUFqKl20wc73r0giE9iw9065rquWQrI95RIkpJuvstYmjGiDEuEn Lc4E3RmTTWx9S5Wc+ObF7TehC/lNofjMTNJk1J6s6mkXO8NQWOM/KvKp17juxnQnu0MD 3pEv3hwKk/nB9DkfuXHlaTl0pujReURgObWc57rIjh1zOEjbERN+XQNNKl+n8TQenUx2 rAUxQv9/dz2EEgULeBsovSrk1S/+5rRqDU1bgCZrNyEcJMvd+YyRmOtKg/tOoVL3w9L5 RR+xj7JTeH0npFNURag0V1c5h79hhanlg2wSyrKmdh6aJp/2BxyPgJLf8Clb6CyA+71r KLGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:to:from:date:dkim-signature; bh=YjOh8x+CSQGbj4xPSaSmIWfs0CZGrfs1HuMmaw6zk28=; fh=pR0/mbGV4Q9+h5AqrXLJawxiuqjcw9L8H7jxSXwks6I=; b=sXHzKGnRmqDQsq8bZiYHX+5uIkT4LwPLxm1TuhwCniVpZO6tgpPdPhqyIoe32Ug2As UcVBPvVfCXt5bCfCIMtACvvpvgFPeP4d9vQUuKDOn0qNZJnk4bpUZybnBQFxQ6GujqvG IPDnyjYnId74iBmRPyiA2FZ0DW5PRhbyst2VyMdhkPzk36+k+VFfUPAdzXABEhEmijwv P/b8/MHwfVMEZkUEDVV4y+S8otu5ojKDqnL8iUa2IKeI4D0/nSHW5C1/yA6cTRfy4c/g pvAK9cL48uqsA+32FE9EYte25hXkFCBUpa7wQv38/bBVjBRCqeR81//VuzQ+M3J4VfE6 HXIA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=jWi1gDd7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [23.128.96.33]) by mx.google.com with ESMTPS id ij27-20020a170902ab5b00b001c9fb3b55f0si11792259plb.652.2023.11.22.05.39.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 22 Nov 2023 05:39:15 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) client-ip=23.128.96.33; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=jWi1gDd7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id C06CA8070331; Wed, 22 Nov 2023 05:36:44 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343968AbjKVNgi (ORCPT + 99 others); Wed, 22 Nov 2023 08:36:38 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49618 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343881AbjKVNgg (ORCPT ); Wed, 22 Nov 2023 08:36:36 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CE672D47 for ; Wed, 22 Nov 2023 05:36:31 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1700660191; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=YjOh8x+CSQGbj4xPSaSmIWfs0CZGrfs1HuMmaw6zk28=; b=jWi1gDd7PFnRkQa2X3spaFHbaAP8+cy6nKTlu2fzkoD3/tZdryTHJe7O9yxMw3Tv37kMuL lcNYqDmIIxjp3WlUYSO8Cm0tpvWyMhO8hX9nx5U+ybnGAjKULCVqQPtSslluKqLnMAbLqF J3/lA2D7UCDF2idvffV6/Y9KYhdvbiY= Received: from mimecast-mx02.redhat.com (mx-ext.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-624-phECgDT5Mb2RugjusxQuHw-1; Wed, 22 Nov 2023 08:36:25 -0500 X-MC-Unique: phECgDT5Mb2RugjusxQuHw-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id EEF353C027A7; Wed, 22 Nov 2023 13:36:24 +0000 (UTC) Received: from localhost (unknown [10.22.8.167]) by smtp.corp.redhat.com (Postfix) with ESMTP id 2662A1121308; Wed, 22 Nov 2023 13:36:24 +0000 (UTC) Date: Wed, 22 Nov 2023 10:36:23 -0300 From: "Luis Claudio R. Goncalves" To: Greg Kroah-Hartman , LKML , linux-rt-users , stable-rt , Steven Rostedt , Thomas Gleixner , Carsten Emde , Sebastian Andrzej Siewior , Daniel Wagner , Tom Zanussi , Clark Williams , Mark Gross , Pavel Machek , Jeff Brady Subject: Re: [ANNOUNCE] 5.10.201-rt98 Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.3 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Wed, 22 Nov 2023 05:36:44 -0800 (PST) On Tue, Nov 21, 2023 at 10:01:25PM -0300, Luis Claudio R. Goncalves wrote: > Hello RT-list! > > I'm pleased to announce the 5.10.201-rt98 stable release. > > This release is just an update to the new stable 5.10.201 > version and no RT changes have been made. > > You can get this release via the git tree at: > > git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git > > branch: v5.10-rt > Head SHA1: 3a93f0a0d49dd0db4c6876ca9a7369350e64320e Greg KH, While testing v5.10.201-rt98 I stumbled over this warning: [ 1000.312397] run blktests nvme/005 at 2023-11-21 21:46:30 ... [ 1000.500478] workqueue: WQ_MEM_RECLAIM nvmet_tcp_wq:nvmet_tcp_io_work [nvmet_tcp] is flushing !WQ_MEM_RECLAIM events:0x0 [ 1000.500490] WARNING: CPU: 0 PID: 6 at kernel/workqueue.c:2620 check_flush_dependency+0x11f/0x140 That seems to be fixed by: 533d2e8b4d5e4 nvmet-tcp: fix lockdep complaint on nvmet_tcp_wq flush during queue teardown (and depending on what else is backported) ddd2b8de9f85b nvmet: fix workqueue MEM_RECLAIM flushing dependency Is this something that can be added to your v5.10 queue or should I carry this fix on v5.10-rt in the meantime? Thank you in advance! Luis > Or to build 5.10.201-rt98 directly, the following patches should be applied: > > https://www.kernel.org/pub/linux/kernel/v5.x/linux-5.10.tar.xz > > https://www.kernel.org/pub/linux/kernel/v5.x/patch-5.10.201.xz > > https://www.kernel.org/pub/linux/kernel/projects/rt/5.10/older/patch-5.10.201-rt98.patch.xz > > Signing key fingerprint: > > 9354 0649 9972 8D31 D464 D140 F394 A423 F8E6 7C26 > > All keys used for the above files and repositories can be found on the > following git repository: > > git://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git > > Enjoy! > Luis > ---end quoted text---