From patchwork Thu Jun 1 06:21:18 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Daniel Wagner X-Patchwork-Id: 101780 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:994d:0:b0:3d9:f83d:47d9 with SMTP id k13csp100382vqr; Thu, 1 Jun 2023 00:01:41 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5atSt57x2z0H1oatnNkVK9WJJd4AnIT6Ygskb8rHlMfTS9fILyuq7F6e8xv3dD+meEJXub X-Received: by 2002:a05:6a20:72a7:b0:110:32ba:33d8 with SMTP id o39-20020a056a2072a700b0011032ba33d8mr7206880pzk.28.1685602900904; Thu, 01 Jun 2023 00:01:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685602900; cv=none; d=google.com; s=arc-20160816; b=LcTfUzevKYw2DZ5ATtduq43FW9R+NwiaDmNje3szdqduwrSeCDS+YDp1NV5q/J8mws Cu4ZT3xLARjotGZCXtoZxr2WwxMsnGspcRKC5JdFJ557l36YtxLspxAmOkpRX6iaw3sg dCZekDfdzDHyiu1HA+wUsAcAZVU/DhHKzd3MkKneWMwaGE1UQuaVQAH766nKUfB/bbxn oHpukhhWBNjBVshk2Newl1yr9aGFjSfDxJczp4srLwu1mY86waRa+I/6oS9/T/HBUsZa CctEf7BXNPRHDiojW8rBF0CAgfP2I5htC4BA4Zjjx2m7Z7xGVEeTLPBnS4ZuqCvjXbwo LsqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:to:from:date:dkim-signature; bh=twcsBfOjTDpVh6VIpSdBFhZaRFo+zWZG1bGrflkWktg=; b=JRhIFBJk3iIwtpqQ7UGB/YlBQDpFvgMKgYoCY+umXlOPAwh2Kg0VjHW247I9T99T3m h+mmb/Y7DMgMP9GJ0eN69mNYR9ySnrlr88EqNKfDUBQuOpL28pzfkT9ev6M9euRg5D5m ltlT/qhRVW64O3hg2zh4EgaJGG2cmJJHws9xA2GCSEbMY/WQ08dSwYsSflbQXUbF6Pj8 39sBPwjy21+CsV20Zt4A1dWGDmvHhR5YTOAlHkJQNrYHFFHGs6b50F1L8eBCc0pUmU7t cwAZIX1FDxZc4mEkKTj09P8/ZbFzBFgO9N4iCvWb3NH+bYAsw42kJDEUyqoj0hH7CdYG jcRw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@monom.org header.s=dkim header.b=HQbf85Ed; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=monom.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t14-20020a1709028c8e00b0019f33cb669asi2160320plo.615.2023.06.01.00.01.27; Thu, 01 Jun 2023 00:01:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@monom.org header.s=dkim header.b=HQbf85Ed; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=monom.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231542AbjFAGkU (ORCPT + 99 others); Thu, 1 Jun 2023 02:40:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51826 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231806AbjFAGkN (ORCPT ); Thu, 1 Jun 2023 02:40:13 -0400 X-Greylist: delayed 600 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Wed, 31 May 2023 23:40:11 PDT Received: from mail.nearlyone.de (mail.nearlyone.de [49.12.199.46]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 90E72133; Wed, 31 May 2023 23:40:11 -0700 (PDT) Received: from [127.0.0.1] (localhost [127.0.0.1]) by localhost (Mailerdaemon) with ESMTPSA id 38E05DE5F8; Thu, 1 Jun 2023 08:21:21 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=monom.org; s=dkim; t=1685600486; h=from:subject:date:message-id:to:mime-version:content-type; bh=twcsBfOjTDpVh6VIpSdBFhZaRFo+zWZG1bGrflkWktg=; b=HQbf85Edrn0Hf5mO8LxC3BoiiOAAI16XHr2BZse7yz6bZXLjYnU1Lyn58z2TC53Ldns2jX zPzHhypvbqa7th7CXrpfuoHNnVaX9wgvqN4ek8MTzIDcEoK2XcKa+iyfYLhAhmWX4a9cKa MCrFmL27xKQuYhY+cAFdBlX8VEZE1TNYYVvtCLhB5p89F9W9CgpLfTIhwAX6DzC6EuPvFb 6ySIW28Ueb0XgoI2inJavdEJzxkid96WcX8ViNpE38WJMO6+42O0USJ+QoMMK+wWkPEq/O sCwerYWuWbcORGMX/KaWAzLul3tsopaj7x02ael5n+JC+O1chbNn1SpWg/gL0A== Date: Thu, 1 Jun 2023 08:21:18 +0200 From: Daniel Wagner To: LKML , linux-rt-users@vger.kernel.org, stable-rt@vger.kernel.org, Steven Rostedt , Thomas Gleixner , Sebastian Andrzej Siewior , Tom Zanussi , Clark Williams Subject: [ANNOUNCE] 4.19.283-rt124 Message-ID: <168560023269.6872.4317883590813798706@beryllium.lan> MIME-Version: 1.0 Content-Disposition: inline X-Last-TLS-Session-Version: TLSv1.3 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1767482747350657224?= X-GMAIL-MSGID: =?utf-8?q?1767482747350657224?= Hello RT-list! I'm pleased to announce the 4.19.283-rt124 stable release. This is just an updating to the 4.19.283 stable release, no RT specific changes. You can get this release via the git tree at: git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git branch: v4.19-rt Head SHA1: 667d7f30ea873d10dc49365c95a387018da5961a Or to build 4.19.283-rt124 directly, the following patches should be applied: https://www.kernel.org/pub/linux/kernel/v4.x/linux-4.19.tar.xz https://www.kernel.org/pub/linux/kernel/v4.x/patch-4.19.283.xz https://www.kernel.org/pub/linux/kernel/projects/rt/4.19/older/patch-4.19.283-rt124.patch.xz Signing key fingerprint: 5BF6 7BC5 0826 72CA BB45 ACAE 587C 5ECA 5D0A 306C All keys used for the above files and repositories can be found on the following git repository: git://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git Enjoy! Daniel Changes from v4.19.280-rt123: --- $ git diff 01355ace5b6eb7a7b153182438bb0667d682b284 v4.19.283 v4.19.280-rt123 +++ b/lib/debugobjects.c @@@ -421,55 -368,6 +421,55 @@@ static void debug_object_is_on_stack(vo WARN_ON(1); } +static struct debug_obj *lookup_object_or_alloc(void *addr, struct debug_bucket *b, + struct debug_obj_descr *descr, + bool onstack, bool alloc_ifstatic) +{ + struct debug_obj *obj = lookup_object(addr, b); + enum debug_obj_state state = ODEBUG_STATE_NONE; + + if (likely(obj)) + return obj; + + /* + * debug_object_init() unconditionally allocates untracked + * objects. It does not matter whether it is a static object or + * not. + * + * debug_object_assert_init() and debug_object_activate() allow + * allocation only if the descriptor callback confirms that the + * object is static and considered initialized. For non-static + * objects the allocation needs to be done from the fixup callback. + */ + if (unlikely(alloc_ifstatic)) { + if (!descr->is_static_object || !descr->is_static_object(addr)) + return ERR_PTR(-ENOENT); + /* Statically allocated objects are considered initialized */ + state = ODEBUG_STATE_INIT; + } + + obj = alloc_object(addr, b, descr); + if (likely(obj)) { + obj->state = state; + debug_object_is_on_stack(addr, onstack); + return obj; + } + + /* Out of memory. Do the cleanup outside of the locked region */ + debug_objects_enabled = 0; + return NULL; +} + +static void debug_objects_fill_pool(void) +{ + /* + * On RT enabled kernels the pool refill must happen in preemptible + * context: + */ - if (!IS_ENABLED(CONFIG_PREEMPT_RT) || preemptible()) ++ if (!IS_ENABLED(CONFIG_PREEMPT_RT_FULL) || preemptible()) + fill_pool(); +} + static void __debug_object_init(void *addr, struct debug_obj_descr *descr, int onstack) { diff --cc lib/debugobjects.c index 5f23d896df55,e28481c402ae..e486693aea49 --- a/lib/debugobjects.c