From mboxrd@z Thu Jan 1 00:00:00 1970 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="ALvoUvib" Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.10]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 19377106 for ; Thu, 30 Nov 2023 09:50:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1701366658; x=1732902658; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=bo2RY81unxVEW7KCome8fE1xIIJ67l5JP/FTWS6G2BU=; b=ALvoUvibU56Ho6+JSMJBQWBY1brBW551+l3naq1/k54dEnihe7ARVuzk lco/ORtUBLRfMytccxyAUiZw/4ia15LNyMGQT82xg429Uc4f8C3rLG74+ tbDE/aJpguvoFMu1ljQwlpTvW7hh46Dit1OG/BWf7dr60bhBj1X3rOp7m AQT6Ivz3CkElEHqAbXqEqgNKQmSer3Ajb0OvUFWDXULMN1wWfmiOYJkkw Fsw6benJh4++oSpTb92pBBeyrSqIRFzpXyrulb0ya8MoStKSw4xSXBkrI cMC+oXXgPw6E/jDOV6Bn10InnaqsNS3IrRr6U7BiC8wMVWa6J/w5JkBPZ Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10910"; a="363667" X-IronPort-AV: E=Sophos;i="6.04,239,1695711600"; d="scan'208";a="363667" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmvoesa104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Nov 2023 09:50:58 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10910"; a="942788405" X-IronPort-AV: E=Sophos;i="6.04,239,1695711600"; d="scan'208";a="942788405" Received: from smile.fi.intel.com ([10.237.72.54]) by orsmga005.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Nov 2023 09:50:54 -0800 Received: from andy by smile.fi.intel.com with local (Exim 4.97) (envelope-from ) id 1r8lBb-00000000lx9-0ury; Thu, 30 Nov 2023 19:50:51 +0200 Date: Thu, 30 Nov 2023 19:50:50 +0200 From: Andy Shevchenko To: "Gustavo A. R. Silva" Cc: Wenyu Huang , pmladek@suse.com, rostedt@goodmis.org, linux@rasmusvillemoes.dk, senozhatsky@chromium.org, akpm@linux-foundation.org, linux-next@vger.kernel.org, gustavoars@kernel.org Subject: Re: [PATCH next] Fix the build failed caused by -Wstringop-overflow Message-ID: References: <20231130105741.2849670-1-huangwenyu5@huawei.com> <730544ae-1e7f-4622-b986-839f81e60384@embeddedor.com> Precedence: bulk X-Mailing-List: linux-next@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo On Thu, Nov 30, 2023 at 07:48:46PM +0200, Andy Shevchenko wrote: > On Thu, Nov 30, 2023 at 09:52:42AM -0600, Gustavo A. R. Silva wrote: > > On 11/30/23 04:57, Wenyu Huang wrote: ... > > > Fixes: 89741e7e42f6 ("Makefile: Enable -Wstringop-overflow globally") > > > > The commit ID is from a patch that's currently in linux-next, which > > does not guarantee it's a stable commit. So, it shouldn't be used > > for any tag in any changelog text. In fact, it has changed a couple > > of times in the last couple of weeks. > > I disagree on this in general. > > The case in practice I have. I does something in new cycle that broke the > enumeration of some devices. The patch is in the maintainer's tree pending > for the next release (v6.8-rc1). There are I see two options: > - revert patch completely and redo it properly > - add a fix (which is one liner) > > Now, what you are suggesting is to drop the Fixes tag on the grounds that > the culprit and the fix are to be in the same release (as we go let's say > with the latter approach). In case that the culprit will be backported > (let's say to satisfy dependencies, as per se it's not a fix), it will > bring a regression and become unnoticed for some time until first reports > will appear. Additional resources would be need for all this. > > So, I'm fully in favour of using Fixes tag as it makes clear if we have > some broken changes in the kernel for which the fix is known and exists. On top of that, Fixes tag is not enough to get it to stable. See the rules on how to submit a material to stable kernels, it's in the documentation. -- With Best Regards, Andy Shevchenko