-
-
Notifications
You must be signed in to change notification settings - Fork 1.3k
kernel: Update sources to DSM-7.2-72806 build #6774
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kernel: Update sources to DSM-7.2-72806 build #6774
Conversation
|
@hgy59 for your review, exctracted from my original PR. |
|
@hgy59 friendly reminder, looks ok to me but a second pair of eye would be nice to have. thnx in advance. |
With the latest dicussions about os_min_ver, I just want to mention that we left the former toolchain versioning. IMHO this would be mandatory for kernel sources. Luckily the os_max_ver can be overwritten by a package, i.e. we can define a lower build number like 63134 for DSM 7.2 PHP packages, that are independent of exact toolchain version. We probably want to lower the built number (in tc_vers.mk) for DSM 7.2 to the one of DSM 7.2.0 but still build with the DSM 7.2.2 toolchains. /cc @mreid-tt |
|
@hgy59, thanks for considering this. Since our The greater impact is on architecture-specific packages. For DSM 6, there is indeed a support gap (build 23739 to 25555), but given the EOL status of DSM 6.2, I’m less concerned about that. My main focus is DSM 7.2 and the support gap there (build 64561 to 72805). Fortunately, we only have a few packages that rely on this — namely Jellyfin, Prowlarr, and Lidarr. If adjusting Alternatively, if we set |
|
Unsure... I'll have to think further about this one. |
Hmm, okay. Ideally it should be dynamic. We can have the |
|
It took me a little to (re)read the PR info, hopefully I capture the essence of the discussion and won't be mudding the water too much. I particularly like view from your proposed table, with the caveat that
From my perspective we really shouldn't bother with the 3rd digit as the build number superseeds that anyway. What I gather is that any NAS being supported with, for instance the 7.2 branch, will keep being supported until the end of that 7.2 branch. Our builds should directly align with the build number used for the toolchain, with the exception of kernel modules that should align with the kernel build number. For users not seing packages, well, they should apply the security fix for that branch so their base build number becomes >= then our toolchain build number. For instance, looking at what's currently available on synology download archive for toolchains: That said, kernel modules should never a toolchain build number higher than its own, here are kernel builds: This means that kernel modules using build Issue is that we're not using build numbers in our framework... Instead we have in It dictates what version to download but really this should be in the toolchain Makefile, like done for kernels and getting rid entirely of that Question is: should the directory structure be revisited to match that, such as All in all, from my perspective |
|
Hey @th0ma7, thanks for the analysis. If I understand correctly, you’re saying that users on an earlier 7.2.x build (e.g., 7.2.1-69057) who choose not to update to the latest 7.2-72806 would effectively be excluded from installing packages (such as Jellyfin) when the OS minimum is set to 7.2. That feels quite restrictive, and I’d prefer if we could support the full range of 7.2 builds, ideally back to the first 7.2 release (7.2-63134), to be more inclusive of all variants. |
@mreid-tt I disagree related to the restrictiveness part of this: there are no reasons for a user to avoid applying security updates, and honestly I don't find this is our problem neither. Still, to follow your thought, that would mean we always stick to using the lowest toolchain build version i.e. 7.2-63134 to ensure proper compatibility, wich we currently aren't as we are rather using latest, 7.2-72806. But easy to do... It also goes back to the potential need of having multiple 7.2- toolchains and removing the third digit used in versions... noting that kernels always needs to match as closely as possible to your running kernel. And personally I'm not willing to provide both 7.2-72806 and 7.2-64570 kernel modules packages ... that is too much work, user simply needs to upgrade. And then again, this problem only concerns 7.2, for the handful of packages no longer compatible with 7.1. I don't see much fuzz of telling users to upgrade (otherwise we must downgrade our toolchain accordinly to ensure compatibility). This is currently quite "niche" but might change with the arrival of 7.3 for which the toolchain isn't yet available ... |
|
Hey @th0ma7, thanks for the feedback. Just to clarify, I wasn’t proposing that we build using multiple toolchains. My intention is to continue building with the latest toolchain, but to set the package’s OS minimum to the earliest build for that major–minor DSM version. With that in mind, adding a manual override for |
|
Thnx for the p precisions @mreid-tt , this would mean risking that packages may be incompatible considering updated libs and all between toolchain builds. Risk probably low but still. While i get your point I'm unsure of the benefits. I still believe users must upgrade their dsm and our packages should reflect real build matches. But I'll adjust to what the majority will agree towards. Noting that having package download stats would have been nice.. knowledge of are there really that many users in this scenario. |
|
Hey @thomas, okay. The part I’m still a bit unsure about is how we treat |
Yes, that was my intention too. Just wanted to ask @th0ma7 what this means for packages containing kernel modules |
I would keep things as simple as possible and align with what ever is the decision for regular builds.
I'm concerned that we may hit a compatibility issue and should avoid that: either build with the lowest toolchain build number or the highest, but in all cases ensure the OS_MIN_VER matches. But I'll align with you two if you both want to go a different way and reconvene if there is really a compatibility issue.
From my perspective this is non-negociable: build versions must match, therefore kernel modules must use the build number matching the kernel sources... and toolchain used must be as close as possible to that build. |
I agree. Am working on a number of things for the |
@mreid-tt that would be super nice to get this worked out - and thnx for your work on spkrepo, overdue and much appreciated :) Another thing that would be a nice-to-have is having a more modern look & feel for our web site - but that's clearly out of my league. EDIT: Maybe there's someone on discord that has that skillset and would be willing to update it? |
Description
kernel: Update sources to DSM-7.2-72806 build
Commits from PR #6646
In support to PR #6772
Checklist
all-supportedcompleted successfullyType of change