Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp5844513rdb; Thu, 14 Dec 2023 00:46:07 -0800 (PST) X-Google-Smtp-Source: AGHT+IFLCN4goPH81qyKHTyYZEGS3Tv7PvOcKw9h8oZCUYFoeYQzCyWFOWRfVsVHwNEo8Py7b5Y4 X-Received: by 2002:a05:6808:164b:b0:3ba:e7c:7b7e with SMTP id az11-20020a056808164b00b003ba0e7c7b7emr7909987oib.116.1702543567163; Thu, 14 Dec 2023 00:46:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702543567; cv=none; d=google.com; s=arc-20160816; b=S20EtZ6kXe2gpoJSHxn3kK6zMo3WymUZhLgzc0kfzFqqx174syXmQdwtXS/LEOJdxc cAsLer/GDRhXdXno/DK8w0J0iyjPKGn9PAklO9bt1LDK7utAXjCLCfe4NO6CjyNpdsAL jhetg0CIMxEL1aq6pAZkDH4Cpn3319k7Zk3tf7KPHGo739WGc4l6V582eqUwQd+chJYN PNOQ9CmbzDMX72ncTR6SALsJFETh2mE4qxVR9VjQJRe+7LNXrPKi8Ozhy/rb3am4wYfv V4BzgXUqzBIidToI+YmEtqEMfT3CNtBLeFOqikujEi2RqdLKyg4Hdd9yHgb5uFiMxSxQ b/bA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:to:from:date:dkim-signature; bh=sDSb1qqHtkUz2/XPauaz/NpVOMr1hYcEwXh+vxb5xOM=; fh=9iooPM5c9PwZHqJ9PYiA2zvB2ENxj9ni33+vfpB8pIg=; b=Ckx3TkrRY08wz5F5h8j/98Z7PIKT1QjyxxDvHIbxsM9GD6gfLj3Z2KInnMMYIbuhMo IeGbU6en6+U2zFgtkhLsoPMBYpsPV6xKILdok7u7BaAyH/EY7SQQZ/NpOftMO4aTbNR9 +I/MmPqjaR3/uI5gInvItAXVEPlm0nvYJEY7tbooaNGz1NbPx+8XOe1+gmsxfbp64IBR aX39FN9bCHt8G0yAsQuiWaJjHDEt2D3sGzcGFghF1b59CPyFR6O7Uafjx3PiZqxUveb4 M/ZTGDWFnmMjSnW3TBRkFyryyYlxLemPt5ZGNHpxZKcD9plTa+dqLRoax6SoatHG/b0u QePA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@monom.org header.s=dkim header.b=qkEQ9YI3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=monom.org Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id z3-20020a17090a1fc300b002859aae3eaasi1682943pjz.66.2023.12.14.00.46.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 14 Dec 2023 00:46:07 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; dkim=pass header.i=@monom.org header.s=dkim header.b=qkEQ9YI3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=monom.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id CE32D80859B7; Thu, 14 Dec 2023 00:45:37 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230076AbjLNIpT (ORCPT + 99 others); Thu, 14 Dec 2023 03:45:19 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56484 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229633AbjLNIpS (ORCPT ); Thu, 14 Dec 2023 03:45:18 -0500 Received: from mail.nearlyone.de (mail.nearlyone.de [49.12.199.46]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 684E0E3; Thu, 14 Dec 2023 00:45:22 -0800 (PST) Received: from [127.0.0.1] (localhost [127.0.0.1]) by localhost (Mailerdaemon) with ESMTPSA id ECECCE1D60; Thu, 14 Dec 2023 09:45:17 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=monom.org; s=dkim; t=1702543520; h=from:subject:date:message-id:to:mime-version:content-type; bh=sDSb1qqHtkUz2/XPauaz/NpVOMr1hYcEwXh+vxb5xOM=; b=qkEQ9YI3iIyEBnMTfq8Jtoj5HwaF8OuTT9xFUHbpEUAAcJWp5Vmr8h2SaS42JoelIFfuqz nVW0LJWPdh4dBMugTgl0EzhEOYOlBPnRI3XaBlZ1OYxvyS7o9FR4I+YUf5+m6CrhJ8g1mr QByI3MT7ZmTogTGOhgjYae0+ZCMYf7TclNGE8A7IEqZ/X3jjT4Aa6mJwFeHaZyZgViyFmN jKNBR6F22V9UtCk1FH7yboTfeDDZMIQqeGsqAa/D4yDNU7bX0iIEt91OrPB+CFyUKziK5z kzZfHGPOyRzkShFLlD8gxm5DQJF4u8MlsTgtOXZKjH5Ka4MzeIP2KK3QIBDq1g== Date: Thu, 14 Dec 2023 09:45:17 +0100 From: Daniel Wagner To: LKML , linux-rt-users@vger.kernel.org, stable-rt@vger.kernel.org, Steven Rostedt , Thomas Gleixner , Sebastian Andrzej Siewior , Tom Zanussi , Clark Williams Subject: [ANNOUNCE] 4.19.299-rt130 Message-ID: <170254303594.22090.13135204123422729997@beryllium.lan> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Last-TLS-Session-Version: TLSv1.3 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Thu, 14 Dec 2023 00:45:38 -0800 (PST) Hello RT-list! I'm pleased to announce the 4.19.299-rt130 stable release. This is just updating the stable release 4.19.299. No RT specific changes. There was a conflict due to the backport of 56e894982522 ("sched/rt: Provide migrate_disable/enable() inlines") to stable. Thus I dropped the backport because v4.19-rt already provides these two functions. You can get this release via the git tree at: git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git branch: v4.19-rt Head SHA1: a279ca52df99df429ac873bcd8cf7df8569758ae Or to build 4.19.299-rt130 directly, the following patches should be applied: https://www.kernel.org/pub/linux/kernel/v4.x/linux-4.19.tar.xz https://www.kernel.org/pub/linux/kernel/v4.x/patch-4.19.299.xz https://www.kernel.org/pub/linux/kernel/projects/rt/4.19/older/patch-4.19.299-rt130.patch.xz Signing key fingerprint: 5BF6 7BC5 0826 72CA BB45 ACAE 587C 5ECA 5D0A 306C All keys used for the above files and repositories can be found on the following git repository: git://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git Enjoy! Daniel Changes from v4.19.295-rt129: --- Daniel Wagner (2): Revert "sched/rt: Provide migrate_disable/enable() inlines" Linux 4.19.299-rt130 --- include/linux/preempt.h | 30 ------------------------------ localversion-rt | 2 +- 2 files changed, 1 insertion(+), 31 deletions(-) --- diff --git a/include/linux/preempt.h b/include/linux/preempt.h index 29ecd13afdda..9c74a019bf57 100644 --- a/include/linux/preempt.h +++ b/include/linux/preempt.h @@ -422,34 +422,4 @@ static inline void preempt_notifier_init(struct preempt_notifier *notifier, #endif -/** - * migrate_disable - Prevent migration of the current task - * - * Maps to preempt_disable() which also disables preemption. Use - * migrate_disable() to annotate that the intent is to prevent migration, - * but not necessarily preemption. - * - * Can be invoked nested like preempt_disable() and needs the corresponding - * number of migrate_enable() invocations. - */ -static __always_inline void migrate_disable(void) -{ - preempt_disable(); -} - -/** - * migrate_enable - Allow migration of the current task - * - * Counterpart to migrate_disable(). - * - * As migrate_disable() can be invoked nested, only the outermost invocation - * reenables migration. - * - * Currently mapped to preempt_enable(). - */ -static __always_inline void migrate_enable(void) -{ - preempt_enable(); -} - #endif /* __LINUX_PREEMPT_H */ diff --git a/localversion-rt b/localversion-rt index 90303f5aabcf..6fa797e5b850 100644 --- a/localversion-rt +++ b/localversion-rt @@ -1 +1 @@ --rt129 +-rt130