[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#841368: gcc-6 6.2.0-7 breaks kernel build if stack protection is enabled



On 21/10/2016 16:36, Ben Hutchings wrote:
On Fri, 2016-10-21 at 12:40 +0300, Konstantin Demin wrote:


I disagree: you fix debian code but upstream kernel is also affected.
I wanted to compile the upstream 4.4.26 for the COW fixe and cannot.
Please revert.

It is absolutely supported (so long as you enable the necessary
features) and is common practice.  However, any bugs in some other
version of the kernel should not be assigned to src:linux.

Thanks Ben. BTW : I was originally arguing against the move to linux:src for a bug I opened on gcc because I was compiling upstream vanilla kernel code. (I never open a bug in linux:src as I barely use it except at first install).

I also dislike, gcc advocates forcibly merging bugs people have discovered rebuilding debian kernel from source and bug discovered compiling upstream vanilla kernel from source not even flagging them "upstream".

Nice game : they broke gcc with their patches (even if for possible good technical security reasons), and then, when bug are detected, even if bug report (like mine) explicitly specified upstream vanilla kernel code they reaffect it to linux:src asking for someone else to clean up the mess.

I do think (like you wrote elsewhere) that fixing debian kernel build is not a solution: until the needed patches are applied upstream, tagged for stable and have been propagated to the various LTS kernel,theses patches needs to be reverted.


-- eric


Reply to: