Received: by 10.223.185.116 with SMTP id b49csp8432344wrg; Fri, 2 Mar 2018 01:28:53 -0800 (PST) X-Google-Smtp-Source: AG47ELtK8kAchfMOQH6ghm+wbuNKK9fJjJL4+jgSvVk0pdVVT5H6+4Eigl8rbu+v9XqT+J5FjjhN X-Received: by 10.98.11.19 with SMTP id t19mr5089512pfi.70.1519982933118; Fri, 02 Mar 2018 01:28:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519982933; cv=none; d=google.com; s=arc-20160816; b=JTB1xh1gcPd/fAD5tC/9fNW7tBg9U+4Babcuhij/f2zjB9beYMGC6thIA4RurHw93G dGstgb5loZuxWJb62DOj/qA7/eMfJWNMUqQ+grwP9zLRMkXk96jyNCBwkTwBOQQTOMpG 2F9iVUKGuWLwFDKW1MOYiMJ8WATpb/fRk/jO/ae1/0a7xEVKko/ZmAHX/6fc8y4SMZxX ew834JbDb+8cuRbVWfIpbaGA7QMOvPeBkp+vqLH55YOegn7tCGzgqOvm2COlmfm9fgGB jD3rgTmbNq7aviwZ41KmjeU6xKKzG+iiufgqjOVZsUvGoguAe3+lTTLGWs3YPZu0qCG9 2FQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=JVuD1SEH9j6xQZfwKcaG3XOgu0AppkKN1XsLVZ+4O4k=; b=rPqTqP7Nh0HhCPBrh1cBTIEml+2EgOzB7ZVDxq0/vuBwZC3c0z4dS+PCnyKYLnFsSG pvEpm6tnGXrsIQ0f62oV0kr0RDg5DVU4W/G6LBOHEzEBjWJtqLmpP5YQ4iRCzoZ6Ld1R Ch/o5h4uiiSBzEe1fvwaq8214RAC2X9VsehzEWoD1UrFHbKwpJiEVUWfK+85qN1nCoay 8lmCjd7qLcucNz0yJj5sKJWh9xtV4HcFyfsHTJVoXs1Ra32lEmf+FfG3atJ8Hk1X0Dq/ 3Gj1+IYwoTRxfm/ByHKdeOZpz0H8dI35A9pxGkKHaud4x08C3FJehzNgVW5I+SjOiMwQ Gazw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=FF/LPPGu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u3-v6si4653365plj.207.2018.03.02.01.28.38; Fri, 02 Mar 2018 01:28:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=FF/LPPGu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1425068AbeCBJD5 (ORCPT + 99 others); Fri, 2 Mar 2018 04:03:57 -0500 Received: from mail-lf0-f68.google.com ([209.85.215.68]:44170 "EHLO mail-lf0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1425027AbeCBJDi (ORCPT ); Fri, 2 Mar 2018 04:03:38 -0500 Received: by mail-lf0-f68.google.com with SMTP id v9so12247401lfa.11; Fri, 02 Mar 2018 01:03:36 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=JVuD1SEH9j6xQZfwKcaG3XOgu0AppkKN1XsLVZ+4O4k=; b=FF/LPPGuEXRD+/QDtdJS6D3p6Sb9rA7UUaKxy5EwHQAYVgHWsLyp6Ozox/EZNDFvK9 yQ3ibNwxb5LuYN/Ihru2Vu6JGVxTyw1pvGXAdZaYY5nybhyhZ22Rc33dqCCvNFqrFZIR s7X91DKBSCHD3l4XFennz8XCN8yKGaDiOUpfnzjWk1MZXjeo1UkINbiFclI3lz66v/vy B1HpeiN2D22wcRIvgFpV19usd5BhfKKbUcqge4pmi1Lj+Q4PKl9JuMZmv86DLftA1hfx 7DmkZPiF7Vr9c+gF9eqE6nYfcUXW2ZrUk0JKizJcptBTArYBhETl3uavlZ87KB2MH3+T Vzhg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=JVuD1SEH9j6xQZfwKcaG3XOgu0AppkKN1XsLVZ+4O4k=; b=Gp0VzmiOj59Q58tHEmh5Bfw+tmVl5N4zbqYI1qR/77EDmdX0JVfDYhgAc3htbbgVn1 B+fNTl8fqu7t0bYvHuJb1mLtxMT0slFIZGHRDigcl52zaAH/E23hqJ9U+qxGVOF8uq65 OhiA0jPZDbTEeWFBpQkx+qUIFzcfu1N6EGWq4Xu+Z/jgfBg7Cnmv5QBD82t6vnl226eD EoynVADSElQzxYOaYA/e/PWbDIggixSa6n6YYV8w1NQdau1r1Q6VA9/Du2z4/AdGEHRR TMYdj17L3uwBT4asZXQJ90wPiE0VF9atmplgeFDWMtOXwuoU3lEQt8DS2qacNSZTrXgQ XW2g== X-Gm-Message-State: APf1xPDVk9Mu7MV0rufCqBW0GwsmQLuh/bpDqbrqp05SD5JjyUgm4NN3 bSdGl/X8nfO6MJbRz2xF4xA= X-Received: by 10.46.71.12 with SMTP id u12mr3307359lja.79.1519981415620; Fri, 02 Mar 2018 01:03:35 -0800 (PST) Received: from huvuddator (ua-213-113-106-221.cust.bredbandsbolaget.se. [213.113.106.221]) by smtp.gmail.com with ESMTPSA id n11sm1238548lje.15.2018.03.02.01.03.34 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Fri, 02 Mar 2018 01:03:35 -0800 (PST) Date: Fri, 2 Mar 2018 10:03:26 +0100 From: Ulf Magnusson To: Masahiro Yamada Cc: Arnd Bergmann , Rich Felker , Kernel Hardening , X86 ML , Paul Mackerras , "H. Peter Anvin" , sparclinux , Sam Ravnborg , Yoshinori Sato , Jonathan Corbet , Richard Weinberger , Linux-sh list , Ingo Molnar , Emese Revfy , Kees Cook , uml-devel , Linux Kbuild mailing list , Peter Oberparleiter , Jeff Dike , linuxppc-dev , user-mode-linux-user@lists.sourceforge.net, Thomas Gleixner , Michal Marek , Greg Kroah-Hartman , Randy Dunlap , "open list:DOCUMENTATION" , Linux Kernel Mailing List , Linus Torvalds , "David S. Miller" Subject: Re: [PATCH 00/23] kconfig: move compiler capability tests to Kconfig Message-ID: <20180302090326.h55wontzv3traxnn@huvuddator> References: <1518806331-7101-1-git-send-email-yamada.masahiro@socionext.com> <20180218221352.GA6651@ravnborg.org> <20180221213946.w4v6ywy7fbiy6oyc@huvuddator> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170609 (1.8.3) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 02, 2018 at 02:50:39PM +0900, Masahiro Yamada wrote: > 2018-02-22 6:39 GMT+09:00 Ulf Magnusson : > > On Wed, Feb 21, 2018 at 09:57:03PM +0900, Masahiro Yamada wrote: > >> 2018-02-21 19:52 GMT+09:00 Arnd Bergmann : > >> > On Wed, Feb 21, 2018 at 11:20 AM, Masahiro Yamada > >> > wrote: > >> >> 2018-02-21 18:56 GMT+09:00 Arnd Bergmann : > >> >>> On Wed, Feb 21, 2018 at 8:38 AM, Masahiro Yamada > >> >>> wrote: > >> >>>> 2018-02-20 0:18 GMT+09:00 Ulf Magnusson : > >> >> > >> >> Let me clarify my concern. > >> >> > >> >> When we test the compiler flag, is there a case > >> >> where a particular flag depends on -m{32,64} ? > >> >> > >> >> For example, is there a compiler that supports -fstack-protector > >> >> for 64bit mode, but unsupports it for 32bit mode? > >> >> > >> >> $(cc-option -m32) -> y > >> >> $(cc-option -m64) -> y > >> >> $(cc-option -fstack-protector) -> y > >> >> $(cc-option -m32 -fstack-protector) -> n > >> >> $(cc-option -m64 -fstack-protector) -> y > >> >> > >> >> I guess this is unlikely to happen, > >> >> but I am not whether it is zero possibility. > >> >> > >> >> If this could happen, > >> >> $(cc-option ) must be evaluated together with > >> >> correct bi-arch option (either -m32 or -m64). > >> >> > >> >> > >> >> Currently, -m32/-m64 is specified in Makefile, > >> >> but we are moving compiler tests to Kconfig > >> >> and, CONFIG_64BIT can be dynamically toggled in Kconfig. > >> > > >> > I don't think it can happen for this particular combination (stack protector > >> > and word size), but I'm sure we'll eventually run into options that > >> > need to be tested in combination. For the current CFLAGS_KERNEL > >> > setting, we definitely have the case of needing the variables to be > >> > evaluated in a specific order. > >> > > >> > >> > >> > >> > >> I was thinking of how we can handle complex cases > >> in the current approach. > >> > >> > >> > >> (Case 1) > >> > >> Compiler flag -foo and -bar interacts, so > >> we also need to check the combination of the two. > >> > >> > >> config CC_HAS_FOO > >> def_bool $(cc-option -foo) > >> > >> config CC_HAS_BAR > >> def_bool $(cc-option -bar) > >> > >> config CC_HAS_FOO_WITH_BAR > >> def_bool $(cc-option -foo -bar) > >> > >> > >> > >> (Case 2) > >> Compiler flag -foo is sensitive to word-size. > >> So, we need to test this option together with -m32/-m64. > >> User can toggle CONFIG_64BIT, like i386/x86_64. > >> > >> > >> config CC_NEEDS_M64 > >> def_bool $(cc-option -m64) && 64BIT > >> > >> config CC_NEEDS_M32 > >> def_bool $(cc-option -m32) && !64BIT > >> > >> config CC_HAS_FOO > >> bool > >> default $(cc-option -m64 -foo) if CC_NEEDS_M64 > >> default $(cc-option -m32 -foo) if CC_NEEDS_M32 > >> default $(cc-option -foo) > >> > >> > >> > >> (Case 3) > >> Compiler flag -foo is sensitive to endian-ness. > >> > >> > >> config CC_NEEDS_BIG_ENDIAN > >> def_bool $(cc-option -mbig-endian) && CPU_BIG_ENDIAN > >> > >> config CC_NEEDS_LITTLE_ENDIAN > >> def_bool $(cc-option -mlittle-endian) && CPU_LITTLE_ENDIAN > >> > >> config CC_HAS_FOO > >> bool > >> default $(cc-option -mbig-endian -foo) if CC_NEEDS_BIG_ENDIAN > >> default $(cc-option -mlittle-endian -foo) if CC_NEEDS_LITTLE_ENDIAN > >> default $(cc-option -foo) > >> > >> > >> > >> > >> Hmm, I think I can implement those somehow. > >> But, I hope we do not have many instances like this... > >> > >> > >> If you know more naive cases, please share your knowledge. > >> > >> Thanks! > >> > >> > >> -- > >> Best Regards > >> Masahiro Yamada > > > > Would get pretty bad if a test needs to consider multiple symbols. > > Exponential explosion there... > > > > > > I thought some more about the implementation of dynamic (post-parsing) > > functions to see how bad it would get with the current implementation. > > > > Some background on how things work now: > > > > 1. All expression operands in Kconfig are symbols. > > > > 2. Returning '$ENV' or '$(fn foo)' as a T_WORD during parsing gets > > you symbols with those strings as names and S_UNKNOWN type (because > > they act like references to undefined symbols). > > > > 3. For "foo-$(fn foo)", you also get a symbol with that string as its > > name and S_UNKNOWN type (stored among the SYMBOL_CONST symbols) > > > > 4. Symbols with S_UNKNOWN type get their name as their string value, > > and the tristate value n. > > > > So, if you do string expansion on the names of symbols with S_UNKNOWN > > type in sym_calc_value(), you're almost there with the current > > implementation, except for the tristate case. > > > > Maybe you could set the tristate value of S_UNKNOWN symbols depending on > > the string value you end up with. Things are getting pretty confusing at > > that point. > > > > Could have something like S_DYNAMIC as well. More Kconfig complexity... > > > > Then there's other complications: > > > > 1. SYMBOL_CONST is no longer constant. > > > > 2. Dependency loop detection needs to consider symbol references > > within strings. > > > > 3. Dependency loop detection relies on static knowledge of what > > symbols a symbol depends on. That might get messy for certain > > expansions, though it might be things you wouldn't do in practice. > > > > 4. Symbols still need to be properly invalidated. It looks like at > > least menuconfig just does a dumb invalidate-everything whenever > > the value of a symbol is changed though, so it might not require > > extra work. (Bit messier in Kconfiglib, which does minimal > > invalidation to keep scripts fast, but just need to extract a few > > extra deps there.) > > > > > > It looks like dynamic functions could get quite messy, but might be > > doable if absolutely required. There's probably more devils in the > > details though. > > > > I don't think the static function model precludes switching models later > > btw, when people have more experience. > > > > I really want to start with the static function model > and see if we need the dynamic function implementation. Yeah, let's start with static functions, IMO. Either we'll learn that they're powerful enough in practice, and save ourselves some work, or we'll gain experience for later. Converting from static to dynamic functions should be painless, if needed. My plan would be something like: 1. Implement static functions 2. Convert as many simple cases over to them as possible 3. See how bad the bad cases get. If they get really bad, then decide what to do next (extend Kconfig, handle them in the Makefiles, etc.) > > Here is an idea for the migration path in case > we need to do that in the future. > > > > Currently, every time user input is given, > sym_clear_all_valid() is called. > > It is not efficient to blindly re-evaluate expensive $(shell ...) I think menuconfig only reevalutes the symbols in the menu that's currently shown in the interface (along with their dependencies). Maybe that'd be bad enough though. > > > So, have a list of symbols the function depends on > in its arguments. > > For example, > > config CC_HAS_SANE_STACKPROTECTOR > def_bool $(shell $srctree/scripts/gcc-has-stack-protector.sh > $CC $(1), CFLAGS_BASE) > > > Here the first argument > $srctree/scripts/gcc-x86-has-stack-protector.sh $CC $(1) > > is the shell command. > $(1), $(2), ... will be replaced with the values of symbols (or expressions) > that follow when running the shell command. > > > The second argument > CFLAGS_BASE > is the dependency symbol (or expression). > > > CFLAGS_BASE can be dynamically changed like > > config CFLAGS_BASE > string > default "-m64" if 64BIT > default "-m32" > > > When and only when CFLAGS_BASE is updated, the function should be re-calculated. > (This will require efforts to minimize the amount of re-evaluation.) > > > > > cc-option will be implemented like follows: > > macro cc-option $(shell $CC -Werror $$(1) $(1) -c -x c /dev/null -o > /dev/null, CFLAGS_BASE) > > > > Please notice the difference between $$(1) and $(1). > > $(1) is immediately expanded by cc-option macro. > > $$(1) is escaped since we want to expand it by $(shell ...), not by > $(cc-option ...) > > > > For example, > > $(cc-option -fstack-protector) > > will be expanded to > > $(shell gcc -Werror $(1) -fstack-protector -c -x c /dev/null -o > /dev/null, CFLAGS_BASE) > > Since macros are just textual shorthand, so this expansion happens > during the parse phase. > > > > Then, the evaluation phase does the following every time CFLAGS_BASE is updated. > > gcc -Werror [value of CFLAGS_BASE] -fstack-protector -c -x c /dev/null > -o /dev/null > > > This is a new form of expression, so it will be managed in AST tree > with a flag E_SHELL (or E_FUNC) etc. > > > Not implemented at all. Just a rough sketch. A simpler syntax like $(shell $CC -Werror {CFLAGS_BASE} -c -x c /dev/null -o /dev/null) might work as well. Then you wouldn't have to any double escaping, and having both $(1) and the value for it appear in the same place seems a bit redundant. I wonder if dependency management might get messy... Anyway, let's just go with static functions... Cheers, Ulf