Package Details: linux-rt-docs 5.2_rt1-1

Git Clone URL: (read-only)
Package Base: linux-rt
Description: Kernel hackers manual - HTML documentation that comes with the Linux-rt kernel
Upstream URL:
Licenses: GPL2
Submitter: schivmeister
Maintainer: jhernberg (dvzrv)
Last Packager: dvzrv
Votes: 159
Popularity: 1.559433
First Submitted: 2011-08-09 20:03
Last Updated: 2019-07-19 22:36

Latest Comments

1 2 3 4 5 6 ... Next › Last »

Ralf_Mardorf commented on 2019-07-28 10:16

There's a thread at the Jack-Devel mailing list, that is interesting regarding Spectre mitigations and CONFIG_AUDIT, see advice on xruns. The subscriber is able to reduce frames/period from 24 to 12, take a look at this posting.

dvzrv commented on 2019-06-18 22:02

@microsoftenator: you're absolutely right! same goes for linux-rt-lts (had a false positive when grepping for BCACHE). Please forget what I wrote earlier! :)

microsoftenator commented on 2019-06-18 08:34

@dvzrv I'm pretty sure bcache is disabled for rt kernels

dvzrv commented on 2019-06-17 22:36

Please also note, that the current TCP based vulnerability in all kernels probably won't be patched in linux-rt, until it is ported to 5.1.x (as 5.0.x is EOL).

merlyn commented on 2019-06-11 18:18

5.0.19_rt is working for me. @Ralf thanks for the tip. @jhernberg and @dvzrv thanks for your work maintaining and packaging this!

jhernberg commented on 2019-05-17 08:39

@merlyn: Yes, reporting your issue on the linux-rt-users mailing list is probably the best recourse!

Ralf_Mardorf commented on 2019-05-16 15:39

merlyn, you should subscribe to the linux-rt-users discussion and bug reporting mailing list

merlyn commented on 2019-05-16 15:21

I tried 5.0.10_rt and I'm still getting the same error.

dvzrv commented on 2019-05-13 21:17

I have added a signed, unofficial user repository for linux-rt, backed by this PKGBUILD.

You can add it to your pacman.conf with:

Server =$arch

I'll try to keep it as up-to-date as possible and retain old versions.


tallero commented on 2019-04-23 23:01

Solved using gpg --recv-keys <missing key>