Description of problem: GCC 12 fails to call volatile inline assembly routines. This is causing failures in the kernel at a minimum. The reported failures in BZ 2053729 (RPi4 wired network fails) and likely also BZ 2053214 (early kernel panic on aarch64). The latter isn't 100% but similar to the other one shows up in an a/b gcc 11/12 test. Version-Release number of selected component (if applicable): 12.0.1 How reproducible: 100% when the code compiles incorrectly and is tracked down to the failing code path. Actual results: The compiler emits correct code but fails to call it. Expected results: Volatile assembly code is _always_ called. Additional info: The bug has been fixed in gcc here: https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=aabb9a261ef060cf24fd626713f1d7d9df81aa57
Proposed as a Blocker for 36-final by Fedora user jlinton using the blocker tracking app because: The compiler is failing to call asm volatile routines in the kernel, and likely other places. This is a very serious code generation problem, and its someone amazing that its not more visible at the moment. The rpi network failure is being worked around at the moment, but its quite likely the seattle/xgene and possibly other platforms are failing as well, although tracking down the exact code generation bug in each case is time consuming.
Also, I did a gcc scratch build last week with the (at the time) proposed patch https://koji.fedoraproject.org/koji/taskinfo?taskID=85305165 for testing purposes.
Discussed during the 2022-04-11 blocker review meeting: [1] The decision to classify this bug as an RejectedBlocker and conditional AcceptedFreezeException was made: "We are wary of what breakage this could cause this late in the cycle, and we don’t have any reports of major issues that this bug causes. We are willing to accept this as an FE if we slip F36 this week." [1] https://meetbot-raw.fedoraproject.org/fedora-blocker-review/2022-04-11/f36-blocker-review.2022-04-11-16.00.log.txt
I'm building gcc with that fix among other fixes in https://koji.fedoraproject.org/koji/taskinfo?taskID=85500093 https://koji.fedoraproject.org/koji/taskinfo?taskID=85504429 but it can take more than a day to finish.
Upstream bug is https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105160
FEDORA-2022-80766fc77b has been submitted as an update to Fedora 36. https://bodhi.fedoraproject.org/updates/FEDORA-2022-80766fc77b
FEDORA-2022-80766fc77b has been pushed to the Fedora 36 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2022-80766fc77b` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2022-80766fc77b See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
FEDORA-2022-80766fc77b has been pushed to the Fedora 36 stable repository. If problem still persists, please make note of it in this bug report.
I believe the FE status was granted for kernel rebuild too, so, reopening, re-assigning to kernel. Justin, fixed gcc ( gcc-12.0.1-0.16.fc36 ) is now in f36 buildroot, can you go ahead and fire off the kernel rebuild please?
The 5.17.3-302 build is a build of 5.17.3 with this patch backed out, but built against the new gcc 12 build. If someone could please verify that it works before I file an update, I would appreciate it.
FEDORA-2022-c38066128d has been submitted as an update to Fedora 36. https://bodhi.fedoraproject.org/updates/FEDORA-2022-c38066128d
FEDORA-2022-c38066128d has been pushed to the Fedora 36 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2022-c38066128d` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2022-c38066128d See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
FEDORA-2022-c38066128d has been pushed to the Fedora 36 stable repository. If problem still persists, please make note of it in this bug report.