From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751129AbeELQEF (ORCPT ); Sat, 12 May 2018 12:04:05 -0400 Received: from mail-wr0-f194.google.com ([209.85.128.194]:40957 "EHLO mail-wr0-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750835AbeELQEE (ORCPT ); Sat, 12 May 2018 12:04:04 -0400 X-Google-Smtp-Source: AB8JxZq+A4AmCUINwliIta16XGxnhqsC3SYOArDpoCI+JXFS4hiJD7I8k5k0yKZ2HtrgCs/0Y3cxzqgXbKYUokaIDug= MIME-Version: 1.0 From: Alexei Starovoitov Date: Sat, 12 May 2018 09:03:42 -0700 Message-ID: Subject: Re: [PATCH bpf v3] x86/cpufeature: bpf hack for clang not supporting asm goto To: Borislav Petkov Cc: Peter Zijlstra , Yonghong Song , Ingo Molnar , Linus Torvalds , Alexei Starovoitov , Daniel Borkmann , LKML , X86 ML , Network Development , Kernel Team , Thomas Gleixner Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 10, 2018 at 10:58 AM, Alexei Starovoitov wrote: > I see no option, but to fix the kernel. > Regardless whether it's called user space breakage or kernel breakage. Peter, could you please ack the patch or better yet take it into tip tree and send to Linus asap ? rc5 is almost here and we didn't have full test coverage for more than a month due to this issue. Thanks