Conversation

This Tweet was deleted by the Tweet author. Learn more
This Tweet was deleted by the Tweet author. Learn more
This Tweet was deleted by the Tweet author. Learn more
This Tweet was deleted by the Tweet author. Learn more
Replying to and
I don't think there's a safe in-process way to safely detect the patch, so unfortunately disabling features depending on it after fork on older kernels or simply not activating them at all seems like the only viable option. Can't work around it since the patch may be backported.
1
My plan is to check for Linux 5.0+ and disable code turning off the feature after fork. It'd be possible to make a table with stable/longterm branches and enable it on those once they're past the point that it was backported upstream. I wish the fix could just be easily detected.
1
Show replies