Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp2141488ybf; Mon, 2 Mar 2020 02:52:23 -0800 (PST) X-Google-Smtp-Source: ADFU+vuqmq1jX4e8CsBkZrsjMVy/e6NCOALJUji4ghxbi77o4F14wyp00gRVAIXxwE7C6clsBL/8 X-Received: by 2002:a9d:7a59:: with SMTP id z25mr2810756otm.315.1583146343689; Mon, 02 Mar 2020 02:52:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583146343; cv=none; d=google.com; s=arc-20160816; b=VxI6C57uV78xgdk9xNZJ/IuscBXkEN632M6pLTya/B2VNYsW7ru0DCkVK0cFOMCnSx 6aCEM6gj9CjZZ0vb9iG+rnNWLZ3/v9SU5jC2/Y1fnTVDXwmI1GNlPSGUI3zGi4ip39Vn oR7/+k4Ratfj5xn71qilOdeG0clM196GlqwNhiS9JVP5dk0di1oLuLp/tKc3OMAsGduu I5M8UNwDYGgAYyAiH468rbfiCCd5v3sTXac72uW7vb7sZmfVv42ByonbVlJL/CnAmC6/ rcS6VnauvxYBetZgOqaeghT1QGtKhyoOd9VBNbJyG3TO0gEnOG5rsKv6DEEPLnxC+Ee3 wPqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=WvljmBJQXXf+GXewyAWZ/d544ncpAbQ4FPbd8XSG8jk=; b=omMlRZ5JdQhzNaci9TydwRO18I8dJJuFn09GP9T0YhLfjasuIcRmtyt/NCpwoMNMpk gFtv9wnb6iVLJR+K8SQvcuvyjBJ355aNNKrR4Pq1W3EDKgJivwClIwtY5lHexmiEaB0b bi2Qt1STIpSh8aa4JLqBcEMxiVMPlFHHISpdCT6aup34picGbfoc9G9v3IGwoY+2c/AO GcKjuJlvq9tSf7OrPPPNBMocNEhzO4MdnhUNv+6inUToslTG8nqIG/6WgeT2evWEbiD2 1f9d6kf2TqRupspp/WqZPz+Z98aUzLCi+LzH6+xaawhK0xi1RqQr1S4Q0WN+KgwHotk1 Pl8w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ellerman.id.au header.s=201909 header.b=WRPVw0MY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f23si6233395oti.283.2020.03.02.02.52.00; Mon, 02 Mar 2020 02:52:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ellerman.id.au header.s=201909 header.b=WRPVw0MY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727588AbgCBKvw (ORCPT + 99 others); Mon, 2 Mar 2020 05:51:52 -0500 Received: from bilbo.ozlabs.org ([203.11.71.1]:56029 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726874AbgCBKvw (ORCPT ); Mon, 2 Mar 2020 05:51:52 -0500 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 48WH5J5J6mz9sSb; Mon, 2 Mar 2020 21:51:48 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ellerman.id.au; s=201909; t=1583146309; bh=b16uewG1Ij2M7fZzm8YX4KBgHz05Ojayzf65tUSrteo=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=WRPVw0MYXwNvewO+4MvrFWaQWlL9dS4BusnrqtmZQRlGB+6kh6XdQbJ/NkeAkZ62e rlG+sfqNrJSwQZkKVb1KYy++Hwq3hKemJCshjrf8Ul5gYnrEvmiUMs9rYyRGr4zZMO QYD1e9yH1usGu4q46IOfyy79zR4/gTgA/r7v70iHo0En1K88RvIPnU7aEw/XfgBxCC yTIV7VGmeV35zMHdeCXfeOCtivsGQeFeUJxLuVxvoQzZY9HqbT+f46YCgXrabWIDX/ ObdNVmIgrcAwBbyKsB4NpkWSMMnJzuTnrqCohNz/LkiwWjnmvAN98GsRzO/41qd6rl t+SkcBlfdgzHA== From: Michael Ellerman To: Linus Torvalds , Paolo Bonzini Cc: Linux Kernel Mailing List , KVM list , linuxppc-dev , Masahiro Yamada Subject: Re: [GIT PULL] Second batch of KVM changes for Linux 5.6-rc4 (or rc5) In-Reply-To: References: <1583089390-36084-1-git-send-email-pbonzini@redhat.com> Date: Mon, 02 Mar 2020 21:51:44 +1100 Message-ID: <87pndvrpvj.fsf@mpe.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Linus Torvalds writes: > On Sun, Mar 1, 2020 at 1:03 PM Paolo Bonzini wrote: >> >> Paolo Bonzini (4): >> KVM: allow disabling -Werror > > Honestly, this is just badly done. > > You've basically made it enable -Werror only for very random > configurations - and apparently the one you test. > > Doing things like COMPILE_TEST disables it, but so does not having > EXPERT enabled. > > So it looks entirely ad-hoc and makes very little sense. At least the > "with KASAN, disable this" part makes sense, since that's a known > source or warnings. But everything else looks very random. > > I've merged this, but I wonder why you couldn't just do what I > suggested originally? > > Seriously, if you script your build tests, and don't even look at the > results, then you might as well use > > make KCFLAGS=-Werror > > instead of having this kind of completely random option that has > almost no logic to it at all. > > And if you depend entirely on random build infrastructure like the > 0day bot etc, this likely _is_ going to break when it starts using a > new gcc version, or when it starts testing using clang, or whatever. > So then we end up with another odd random situation where now kvm (and > only kvm) will fail those builds just because they are automated. > > Yes, as I said in that original thread, I'd love to do -Werror in > general, at which point it wouldn't be some random ad-hoc kvm special > case for some random option. But the "now it causes problems for > random compiler versions" is a real issue again - but at least it > wouldn't be a random kernel subsystem that happens to trigger it, it > would be a _generic_ issue, and we'd have everybody involved when a > compiler change introduces a new warning. > > I've pulled this for now, but I really think it's a horrible hack, and > it's just done entirely wrong. > > Adding the powerpc people, since they have more history with their > somewhat less hacky one. Except that one automatically gets disabled > by "make allmodconfig" and friends, which is also kind of pointless. > > Michael, what tends to be the triggers for people using > PPC_DISABLE_WERROR? Do you have reports for it? My memory is that we have had very few reports of it actually causing problems. But I don't have hard data to back that up. It has tripped up the Clang folks, but that's partly because they're building clang HEAD, and also because ~zero powerpc kernel developers are building regularly with clang. I'm trying to fix the latter ... The thing that makes me disable -Werror (enable PPC_DISABLE_WERROR) most often is bisecting back to before fixes for my current compiler were merged. For example with GCC 8 if you go back before ~4.18 you hit the warning fixed by bee20031772a ("disable -Wattribute-alias warning for SYSCALL_DEFINEx()"). And then building with GCC head sometimes requires disabling -Werror because of some new warning, sometimes valid sometimes not. I think we could mostly avoid those problems by having the option only on by default for known compiler versions. eg: config WERROR bool "Build with -Werror" default CC_IS_GCC && (GCC_VERSION >= 70000 && GCC_VERSION <= 90000) And we could bump the upper version up once each new GCC version has had any problems ironed out. > Could we have a _generic_ option that just gets enabled by default, > except it gets disabled by _known_ issues (like KASAN). Right now I don't think we could have a generic option that's enabled by default, there's too many warnings floating around on minor arches and in odd configurations. But we could have a generic option that signifies the desire to build with -Werror where possible, and then each arch/subsystem/etc could use that config option to enable -Werror in stages. Then after a release or three we could change the option to globally enable -Werror and opt-out any areas that are still problematic. It's also possible to use -Wno-error to turn certain warnings back into warnings even when -Werror is set, so that's another way we could incrementally attack the problem. It'd also be nice if we could do: $ make WERROR=0 Or something similarly obvious to turn off the WERROR option. That way users don't even have to edit their .config manually, they just rerun make with WERROR=0 and it works. > Being disabled for "make allmodconfig" is kind of against one of the > _points_ of "the build should be warning-free". True, it was just the conservative choice to disable it for allmod/yes. We should probably revisit that these days. cheers