On Thu, 14 Jul 2022 15:14:53 -0700 Linus Torvalds wrote:
On Thu, Jul 14, 2022 at 2:56 PM Jakub Kicinski kuba@kernel.org wrote:
I have clang 13, let me double check this fix is enough for the build to complete without disabling WERROR.
I have clang 14 locally, and it builds fine with that (and doesn't build without it).
FWIW I can confirm - builds with clang 13 as well.
I actually normally build the kernel with both gcc and clang. My "upstream" kernel I build with gcc, and then I have my "private random collection of patches" kernel that I build with clang and that are just rebased on top of the kernel-of-the-day.
This is all entirely for historical reasons - part of my "private random collection of patches" used to be the "asm goto with outputs", which had clang support first.
But then the reason I never even noticed the build breakage with the retbleed patches until much too late was that those I just had as a third fork off my upstream kernel, so despite me usually building with clang too, that only got attention from gcc.
So it's really just a microcosm version of the exact same bigger issue we always have with those embargoed hw security patches: they end up missing out on all the usual test environments.
Anyway, I cherry-picked Nathan's patch from my clang tree and pushed it out as commit db886979683a ("x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current").
Awesome, thanks!