Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp512296ybd; Sat, 29 Jun 2019 01:43:30 -0700 (PDT) X-Google-Smtp-Source: APXvYqxq+KDeJWf17WNPJkWiAEEktsEztHk3b7R85jzjIwgnhWiQVV6wLU8YQ/qe5wo/VQEvoWCa X-Received: by 2002:a63:6cc3:: with SMTP id h186mr13274488pgc.292.1561797810012; Sat, 29 Jun 2019 01:43:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561797810; cv=none; d=google.com; s=arc-20160816; b=AyMM1WbBgmuUlCiKywpK7ZMk0ZTg51r/ueCNBz1R2xpWzqYCc8G0oAs1g6JYGMPgtp dDvR7vPSsa5m4kizXzZF6E5iiGhRXpoYBLMER/xHQfq+ZqhUDwp3wuYujmav5klYKwJ/ /YrF88g8wHGgosOnXMo6sOvStzhTj0ozfB1gDJlVNUEQXExklsrGvf6Cw4FxWc5W+ZPh f2R2VXZB5BjtzT7i6ZDzx6GMfDdcci/LcgZU5NWKFmmuCpK2Vm5Xs8zzNPM3pA4En85a InkTVYWR98xZOJ/mUHIWeRZ6JZd0f3F2g8RtkWr825BYDqAoBAn9ioBXnhLAYx3lnVyX bhPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=dsR8QzpQW1M7BwKjpgI12ojKD+uta0+wwMlNfB2p3Cc=; b=owh/vQkn6RB+guY+p/KrUE5w4I6AnaFmi9zLzr5blI94J9nGlbsITnf9SSlDXFMBYo I3xnc61huBVskxMq6FbhwqOj28X7tq1ErznwJW7f7H2Ju+n/5RTow+1Uqgml9tR+F0xb qebCt+KA/P4i3UDlBZd9M4mUbvf6H5nHdZ/YYYtqK9pP1Z7atf88N+P3hs+ANiBmzRQ+ JOSOwC09esUPM1oTRNJ0bybCVHDu7AT+CuSAzRZr2yS2sm4hZNRkMMWesc+3Vq02Gvvv EHParGv8ofCmXxbgL4zpvnU/dKm9TzMqTUoxrCDyvV4/2G6h1HGF5jWwSbMk2OQR1RUG XhSQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LKBomON3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u69si4301752pgc.531.2019.06.29.01.43.12; Sat, 29 Jun 2019 01:43:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LKBomON3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726879AbfF2InC (ORCPT + 99 others); Sat, 29 Jun 2019 04:43:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:55922 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726812AbfF2InB (ORCPT ); Sat, 29 Jun 2019 04:43:01 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 627942083B; Sat, 29 Jun 2019 08:43:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1561797780; bh=tWHRy4FMp7DnQydopt93j2ub9TZE/tkPNsRLnlo7cAM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=LKBomON3r/S7SyY7Eqki+fWCLEWIPU4w/rIRzZaeWmyOfxx1B3FLZx6TQBDblJc1l XrQjGbY5ux+sVe8zI2M3034WpDTMf8StbhUq0ZBdXk6WcojV4q6vWoZUe5jXcqM5Aq 9qQU6idbLCiayBzIs1G0nHGaFhtrRFa/OtApGnOU= Date: Sat, 29 Jun 2019 10:42:57 +0200 From: Greg Kroah-Hartman To: Luis Chamberlain Cc: Christoph Hellwig , Brendan Higgins , Cristina Moraru , "vegard.nossum@gmail.com" , Valentin Rothberg , Hannes Reinecke , Sam Ravnborg , Michal Marek , "linux-kernel@vger.kernel.org" , Tom Gundersen , Kay Sievers , Rusty Russell , Andrew Morton , backports@vger.kernel.org, Guenter Roeck , "rafael.j.wysocki" , Dmitry Torokhov , Takashi Iwai , Mauro Carvalho Chehab , Johannes Berg , Hauke Mehrtens , Paul Bolle , Paul Gortmaker , Alexey Khoroshilov , Sathya Prakash Veerichetty , "Martin K. Petersen" , Laurence Oberman , Johannes Thumshirn , Tejun Heo , Jej B , Theodore Ts'o , Daniel Jonsson , Andrzej Wasowski Subject: Re: [RFC PATCH 0/5] Add CONFIG symbol as module attribute Message-ID: <20190629084257.GA1227@kroah.com> References: <1471462023-119645-1-git-send-email-cristina.moraru09@gmail.com> <20160818175505.GM3296@wotan.suse.de> <20160825074313.GC18622@lst.de> <20160825201919.GE3296@wotan.suse.de> <20190627045052.GA7594@lst.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jun 28, 2019 at 11:40:22AM -0700, Luis Chamberlain wrote: > On Wed, Jun 26, 2019 at 9:51 PM Christoph Hellwig wrote: > > > > On Wed, Jun 26, 2019 at 03:21:08PM -0700, Luis Chamberlain wrote: > > > On Tue, Feb 5, 2019 at 2:07 PM Luis Chamberlain wrote: > > > > In lieu of no Luke Skywalker, if you will, for a large kconfig revamp > > > > on this, I'm inclined to believe *at least* having some kconfig_symb > > > > exposed for some modules is better than nothing. Christoph are you > > > > totally opposed to this effort until we get a non-reverse engineered > > > > effort in place? It just seems like an extraordinary amount of work > > > > and I'm not quite sure who's volunteering to do it. > > > > > > > > Other stakeholders may benefit from at least having some config --> > > > > module mapping for now. Not just backports or building slimmer > > > > kernels. > > > > > > Christoph, *poke* > > > > Yes, I'm still totally opposed to a half-backed hack like this. > > The solution puts forward a mechanism to add a kconfig_symb where we > are 100% certain we have a direct module --> config mapping. > > This is *currently* determined when the streamline_config.pl finds > that an object has only *one* associated config symbol associated. As > Cristina noted, of 62 modules on a running system 58 of them ended up > getting the kconfig_symb assigned, that is 93.5% of all modules on the > system being tested. For the other modules, if they did want this > association, we could allow a way for modules to define their own > KBUILD_KCONF variable so that this could be considered as well, or > they can look at their own kconfig stuff to try to fit the model that > does work. To be clear, the heuristics *can* be updated if there is > confidence in alternative methods for resolution. But since it is > reflective of our current situation, I cannot consider it a hack. > > This implementation is a reflection of our reality in the kernel, and > as has been discussed in this thread, if we want to correct the gaps > we need to do a lot of work. And *no one* is working towards these > goals. > > That said, even if you go forward with an intrusive solution like the > one you proposed we could still use the same kconfig_symb... > > So no, I don't see this as a hack. It's a reflection as to our current > reality. And I cannot see how the kconfig_symb can lie or be > incorrect. So in fact I think that pushing this forward also makes the > problem statement clearer for the future of what semantics needs to be > addressed, and helps us even annotate the problematic areas of the > kernel. > > What negative aspects do you see with this being merged in practice? I'm trying to see what the actual problem that you are wanting to solve here with this. What exactly is it? Who needs to determine the "singular" configuration option that caused a kernel module to be built at the expense of all other options? What can that be used for and who will use it? confused, greg k-h