From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp1.migadu.com ([2001:41d0:303:e16b::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms1.migadu.com with LMTPS id OIYBEzKsF2b8zAAA62LTzQ:P1 (envelope-from ) for ; Thu, 11 Apr 2024 11:24:02 +0200 Received: from aspmx1.migadu.com ([2001:41d0:303:e16b::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp1.migadu.com with LMTPS id OIYBEzKsF2b8zAAA62LTzQ (envelope-from ) for ; Thu, 11 Apr 2024 11:24:02 +0200 X-Envelope-To: larch@yhetil.org Authentication-Results: aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=wmeyer.eu header.s=mail header.b=Qga3GgUM; spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org"; dmarc=fail reason="SPF not aligned (relaxed)" header.from=wmeyer.eu (policy=none) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1712827442; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding:resent-cc: resent-from:resent-sender:resent-message-id:in-reply-to:in-reply-to: references:references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:dkim-signature; bh=NzjalgplSAcx9cuaBGVj0DdS8LP2vcVdQsunCTTzhzM=; b=UIDW6Zg/5KPk/DEDH6xUdHL04w62X/e0dvCptkROjEKyU0oJ4asZsT3xLnxZSyN5R6tMY5 IcdAS+z3s/m056CY9WhrYc0E7pnWmseBsjcUg5BXEbNPR7QRvvkoDuqSOgHCLUBmyp8+6u 3xVJNQfKMa8rW8V61WhH/zeA3ntI5/nN/Spj+hF3KcO+CL9xgG+2tp3O+Lp1DGf8U7q3ef qQvbvyVa7Bi8q0n7qnEWaTYHwssvGvA6dm8cecZAiBLyf4+sRKEsAPIhPPxEWvflhDMtdX WgqrX0toxVX4F2xALasXVmgVfNv7RYGl7jHK6kE5hPFDzPq9Q9vqquc9uATKig== ARC-Seal: i=1; s=key1; d=yhetil.org; t=1712827442; a=rsa-sha256; cv=none; b=cK0c17ih9faszZNG5A55+ALX2pWLnj7hBvdPk/g9FTCkQZNkOu2bve6xvQ9qec0v/8bEpM 7RCVNhxD52Z029oggLrqcQLqLUOO8cN8hJwb5Bk46BWXczJ0GdjAn6mtfjV5v8LCH9e6yX floODT4Yb588uEeCD6Zv799OrcKwThw0O8gQ8YJloWxeo3zq+uvwc3uoz6hUuIoph0LG63 4Os/dl91C7L14S+auHc/WvYTPbfKIgwthJw7WDniuThQP5Mse/+hxv7VbbGzvLYFSWBOXQ kFnE8M5XFMoJS60yFfhKqucx0+U+W3arfzWwMhXndsU7WY93z1z0iU6+rK41rw== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=wmeyer.eu header.s=mail header.b=Qga3GgUM; spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org"; dmarc=fail reason="SPF not aligned (relaxed)" header.from=wmeyer.eu (policy=none) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 1621F501F7 for ; Thu, 11 Apr 2024 11:24:01 +0200 (CEST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1ruqey-0001jm-5O; Thu, 11 Apr 2024 05:23:56 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1ruqew-0001jZ-24 for guix-patches@gnu.org; Thu, 11 Apr 2024 05:23:54 -0400 Received: from debbugs.gnu.org ([2001:470:142:5::43]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1ruqev-0007kz-QE for guix-patches@gnu.org; Thu, 11 Apr 2024 05:23:53 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1ruqf4-0001Rt-HT for guix-patches@gnu.org; Thu, 11 Apr 2024 05:24:02 -0400 X-Loop: help-debbugs@gnu.org Subject: [bug#70335] Acknowledgement ([PATCH 0/4] linux-libre kernel updates (2024-04-11)) References: In-Reply-To: Resent-From: Wilko Meyer Original-Sender: "Debbugs-submit" Resent-CC: guix-patches@gnu.org Resent-Date: Thu, 11 Apr 2024 09:24:02 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: followup 70335 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: patch To: 70335@debbugs.gnu.org Cc: Wilko Meyer , Leo Famulari Received: via spool by 70335-submit@debbugs.gnu.org id=B70335.17128274405561 (code B ref 70335); Thu, 11 Apr 2024 09:24:02 +0000 Received: (at 70335) by debbugs.gnu.org; 11 Apr 2024 09:24:00 +0000 Received: from localhost ([127.0.0.1]:54952 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1ruqf0-0001RR-Oi for submit@debbugs.gnu.org; Thu, 11 Apr 2024 05:24:00 -0400 Received: from mail.wmeyer.eu ([95.216.196.112]:41390) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1ruqew-0001Px-L1 for 70335@debbugs.gnu.org; Thu, 11 Apr 2024 05:23:57 -0400 From: Wilko Meyer DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=wmeyer.eu; s=mail; t=1712827418; bh=NzjalgplSAcx9cuaBGVj0DdS8LP2vcVdQsunCTTzhzM=; h=From:To:Cc:Subject:Date; b=Qga3GgUMTZR7+zHCVyLVpx+gPi6Y1bB3VwYKzusxsXjkajWyx7pYSGu2PhjraJz0J afsXNJWtuE5c4N0Osp7jmjnflHej/E1+iMHqnLr2nTkvaSrAqevKZS1riSTvQfwfNk 8tuVrhDrFiWLjwQPSI6ZDjZOQvoJGnLlkX1AbW4k= Date: Thu, 11 Apr 2024 11:13:05 +0200 Message-ID: <87msq0ntgp.fsf@wmeyer.eu> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-patches-bounces+larch=yhetil.org@gnu.org Sender: guix-patches-bounces+larch=yhetil.org@gnu.org X-Migadu-Country: US X-Migadu-Flow: FLOW_IN X-Migadu-Spam-Score: -4.47 X-Spam-Score: -4.47 X-Migadu-Queue-Id: 1621F501F7 X-Migadu-Scanner: mx13.migadu.com X-TUID: /5vSffvdMj0A It seems that there's a known issue[0] with at least the 6.8.5 and 6.6.26 releases of this round, preventing system boot if CONFIG_GCC_PLUGIN_STACKLEAK is set, as we have enabled it for all 6.x.x kernels: =CE=BB rg -c 'CONFIG_GCC_PLUGIN_STACKLEAK=3Dy' linux-libre/6.* linux-libre/6.8-x86_64.conf:1 linux-libre/6.8-i686.conf:1 linux-libre/6.8-arm64.conf:1 linux-libre/6.7-x86_64.conf:1 linux-libre/6.7-i686.conf:1 linux-libre/6.7-arm64.conf:1 linux-libre/6.6-x86_64.conf:1 linux-libre/6.6-i686.conf:1 linux-libre/6.6-arm64.conf:1 linux-libre/6.1-x86_64.conf:1 linux-libre/6.1-i686.conf:1 linux-libre/6.1-arm64.conf:1 we seem to have three options: - applying https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit= /?id=3De7d24c0aa8e678f41457d1304e2091cac6fd1a2e as suggested on the corresponding LKML thread[1]. - holding back this round for 6.8.x and 6.6.x. until next weeks round. - applying it and hope it won't cause too much breakage 3. seems to be the worst option with the bug report in mind, 2. would be the option with the least overhead. 1. would have some overhead but seems to fix the situation so this round would be usable. WDYT? [0]: https://fosstodon.org/@kernellogger/112251747670970164 [1]: https://lore.kernel.org/all/CAMj1kXHgvv0FYZXsFm8KisXuR6t47-nXtgOs0Gyva= 4MJEJ_4Ow@mail.gmail.com/#t --=20 Kind regards, Wilko Meyer w@wmeyer.eu