Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp642688ybz; Wed, 15 Apr 2020 15:47:39 -0700 (PDT) X-Google-Smtp-Source: APiQypL9H0KvmHV08frUVVJw190HPl8vqx/fsZ32VWzsIhcIPGZ0tp2XNPd58YMFgUbifxWpt5ZT X-Received: by 2002:aa7:c649:: with SMTP id z9mr12869841edr.288.1586990859604; Wed, 15 Apr 2020 15:47:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586990859; cv=none; d=google.com; s=arc-20160816; b=rAK1/V7KCz7k2eFnke5RZ7TC2GyltxaAxUrzFEVGEFWwCcDpMiLEshPMNL5g8NZmua StaSZRIe0ORPEsik24LQ+PiPt1Fm9I1e6G/3jaPgMw1Lqo8KuQhXRKPjiqYGuvmG20O8 /F/H5f3T258Fhn5Px3BNOW/ZTtGqj1q8NdI3PEQ43tz39RMYJGXhVSUyO1hrK9JNGrea nAYpLzzv3r3L4zLqGkYK1I6mDudH5nbPCN3fMHX4uak/DoiS6Xf89XemfHC+FxyIkP2M iRvlre79ofOcYR4MIvDa8BsfdPNaz4uI4ajobBHFcRxph4PVg4quQ2a4LQ4NxpwttR94 0DCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=ZVAlDPe9uFcLujpsdF9sNQdHfJqKW1fC9H33WOaLXE4=; b=AVNM8zojKTBqFREU78wAR7RPARE8RzDHPOCbwr+aa/HeJf5sk8VM/Go6U15B5Lj7G9 xL02BQj12ixOw9+7G0vnjUlphQ6twDbgh2Dtm9zGT2deGu/bSD67AdYIqBRXTB6O5Gs7 rrfhRGDbTdPwuhm8FOrg44SuXa72lL9R/SALtcgYW4+rw1BCaXB1CqaYtZqD94VQxxW3 TyV4PTa1yk7+gTV37MhAQGPrHCLaJ5KP6+nRdY0pGOwk2GNtA9YzQ0b295BI+tmB3Til DFP+dZ+y3fe3mQ28ftcD8EOwp0IXXKEzR1vCHqXF5VdQQJoy63JVElxpBcGXjkYFmyOr tJgg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l12si11141488edn.414.2020.04.15.15.47.15; Wed, 15 Apr 2020 15:47:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2635932AbgDOJN1 (ORCPT + 99 others); Wed, 15 Apr 2020 05:13:27 -0400 Received: from foss.arm.com ([217.140.110.172]:40350 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404422AbgDOJNV (ORCPT ); Wed, 15 Apr 2020 05:13:21 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 34AA91063; Wed, 15 Apr 2020 02:13:20 -0700 (PDT) Received: from [192.168.1.172] (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E22013F68F; Wed, 15 Apr 2020 02:13:17 -0700 (PDT) Subject: Re: [PATCH 15/15] tools headers: Synchronize linux/bits.h with the kernel sources To: Arnaldo Carvalho de Melo , Ingo Molnar , Thomas Gleixner Cc: Jiri Olsa , Namhyung Kim , Clark Williams , linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, Arnaldo Carvalho de Melo , Adrian Hunter , Rikard Falkeborn References: <20200414164854.26026-1-acme@kernel.org> <20200414164854.26026-16-acme@kernel.org> From: Vincenzo Frascino Message-ID: <7951882d-d13a-7b1e-36f4-73c188015161@arm.com> Date: Wed, 15 Apr 2020 10:14:06 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0 MIME-Version: 1.0 In-Reply-To: <20200414164854.26026-16-acme@kernel.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/14/20 5:48 PM, Arnaldo Carvalho de Melo wrote: > From: Arnaldo Carvalho de Melo > > To pick up the changes in these csets: > > 295bcca84916 ("linux/bits.h: add compile time sanity check of GENMASK inputs") > 3945ff37d2f4 ("linux/bits.h: Extract common header for vDSO") > > To address this tools/perf build warning: > > Warning: Kernel ABI header at 'tools/include/linux/bits.h' differs from latest version at 'include/linux/bits.h' > diff -u tools/include/linux/bits.h include/linux/bits.h > > This clashes with usage of userspace's static_assert(), that, at least > on glibc, is guarded by a ifnded/endif pair, do the same to our copy of > build_bug.h and avoid that diff in check_headers.sh so that we continue > checking for drifts with the kernel sources master copy. > > This will all be tested with the set of build containers that includes > uCLibc, musl libc, lots of glibc versions in lots of distros and cross > build environments. > > The tools/objtool, tools/bpf, etc were tested as well. > Acked-by: Vincenzo Frascino # vDSO parts > Cc: Adrian Hunter > Cc: Jiri Olsa > Cc: Namhyung Kim > Cc: Rikard Falkeborn > Cc: Thomas Gleixner > Cc: Vincenzo Frascino > Signed-off-by: Arnaldo Carvalho de Melo > --- > tools/include/linux/bits.h | 24 ++++++++-- > tools/include/linux/build_bug.h | 82 +++++++++++++++++++++++++++++++++ > tools/include/linux/kernel.h | 4 +- > tools/include/vdso/bits.h | 9 ++++ > tools/perf/check-headers.sh | 2 + > 5 files changed, 115 insertions(+), 6 deletions(-) > create mode 100644 tools/include/linux/build_bug.h > create mode 100644 tools/include/vdso/bits.h > > diff --git a/tools/include/linux/bits.h b/tools/include/linux/bits.h > index 669d69441a62..4671fbf28842 100644 > --- a/tools/include/linux/bits.h > +++ b/tools/include/linux/bits.h > @@ -3,9 +3,9 @@ > #define __LINUX_BITS_H > > #include > +#include > #include > > -#define BIT(nr) (UL(1) << (nr)) > #define BIT_ULL(nr) (ULL(1) << (nr)) > #define BIT_MASK(nr) (UL(1) << ((nr) % BITS_PER_LONG)) > #define BIT_WORD(nr) ((nr) / BITS_PER_LONG) > @@ -18,12 +18,30 @@ > * position @h. For example > * GENMASK_ULL(39, 21) gives us the 64bit vector 0x000000ffffe00000. > */ > -#define GENMASK(h, l) \ > +#if !defined(__ASSEMBLY__) && \ > + (!defined(CONFIG_CC_IS_GCC) || CONFIG_GCC_VERSION >= 49000) > +#include > +#define GENMASK_INPUT_CHECK(h, l) \ > + (BUILD_BUG_ON_ZERO(__builtin_choose_expr( \ > + __builtin_constant_p((l) > (h)), (l) > (h), 0))) > +#else > +/* > + * BUILD_BUG_ON_ZERO is not available in h files included from asm files, > + * disable the input check if that is the case. > + */ > +#define GENMASK_INPUT_CHECK(h, l) 0 > +#endif > + > +#define __GENMASK(h, l) \ > (((~UL(0)) - (UL(1) << (l)) + 1) & \ > (~UL(0) >> (BITS_PER_LONG - 1 - (h)))) > +#define GENMASK(h, l) \ > + (GENMASK_INPUT_CHECK(h, l) + __GENMASK(h, l)) > > -#define GENMASK_ULL(h, l) \ > +#define __GENMASK_ULL(h, l) \ > (((~ULL(0)) - (ULL(1) << (l)) + 1) & \ > (~ULL(0) >> (BITS_PER_LONG_LONG - 1 - (h)))) > +#define GENMASK_ULL(h, l) \ > + (GENMASK_INPUT_CHECK(h, l) + __GENMASK_ULL(h, l)) > > #endif /* __LINUX_BITS_H */ > diff --git a/tools/include/linux/build_bug.h b/tools/include/linux/build_bug.h > new file mode 100644 > index 000000000000..cc7070c7439b > --- /dev/null > +++ b/tools/include/linux/build_bug.h > @@ -0,0 +1,82 @@ > +/* SPDX-License-Identifier: GPL-2.0 */ > +#ifndef _LINUX_BUILD_BUG_H > +#define _LINUX_BUILD_BUG_H > + > +#include > + > +#ifdef __CHECKER__ > +#define BUILD_BUG_ON_ZERO(e) (0) > +#else /* __CHECKER__ */ > +/* > + * Force a compilation error if condition is true, but also produce a > + * result (of value 0 and type int), so the expression can be used > + * e.g. in a structure initializer (or where-ever else comma expressions > + * aren't permitted). > + */ > +#define BUILD_BUG_ON_ZERO(e) ((int)(sizeof(struct { int:(-!!(e)); }))) > +#endif /* __CHECKER__ */ > + > +/* Force a compilation error if a constant expression is not a power of 2 */ > +#define __BUILD_BUG_ON_NOT_POWER_OF_2(n) \ > + BUILD_BUG_ON(((n) & ((n) - 1)) != 0) > +#define BUILD_BUG_ON_NOT_POWER_OF_2(n) \ > + BUILD_BUG_ON((n) == 0 || (((n) & ((n) - 1)) != 0)) > + > +/* > + * BUILD_BUG_ON_INVALID() permits the compiler to check the validity of the > + * expression but avoids the generation of any code, even if that expression > + * has side-effects. > + */ > +#define BUILD_BUG_ON_INVALID(e) ((void)(sizeof((__force long)(e)))) > + > +/** > + * BUILD_BUG_ON_MSG - break compile if a condition is true & emit supplied > + * error message. > + * @condition: the condition which the compiler should know is false. > + * > + * See BUILD_BUG_ON for description. > + */ > +#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg) > + > +/** > + * BUILD_BUG_ON - break compile if a condition is true. > + * @condition: the condition which the compiler should know is false. > + * > + * If you have some code which relies on certain constants being equal, or > + * some other compile-time-evaluated condition, you should use BUILD_BUG_ON to > + * detect if someone changes it. > + */ > +#define BUILD_BUG_ON(condition) \ > + BUILD_BUG_ON_MSG(condition, "BUILD_BUG_ON failed: " #condition) > + > +/** > + * BUILD_BUG - break compile if used. > + * > + * If you have some code that you expect the compiler to eliminate at > + * build time, you should use BUILD_BUG to detect if it is > + * unexpectedly used. > + */ > +#define BUILD_BUG() BUILD_BUG_ON_MSG(1, "BUILD_BUG failed") > + > +/** > + * static_assert - check integer constant expression at build time > + * > + * static_assert() is a wrapper for the C11 _Static_assert, with a > + * little macro magic to make the message optional (defaulting to the > + * stringification of the tested expression). > + * > + * Contrary to BUILD_BUG_ON(), static_assert() can be used at global > + * scope, but requires the expression to be an integer constant > + * expression (i.e., it is not enough that __builtin_constant_p() is > + * true for expr). > + * > + * Also note that BUILD_BUG_ON() fails the build if the condition is > + * true, while static_assert() fails the build if the expression is > + * false. > + */ > +#ifndef static_assert > +#define static_assert(expr, ...) __static_assert(expr, ##__VA_ARGS__, #expr) > +#define __static_assert(expr, msg, ...) _Static_assert(expr, msg) > +#endif // static_assert > + > +#endif /* _LINUX_BUILD_BUG_H */ > diff --git a/tools/include/linux/kernel.h b/tools/include/linux/kernel.h > index cba226948a0c..a7e54a08fb54 100644 > --- a/tools/include/linux/kernel.h > +++ b/tools/include/linux/kernel.h > @@ -5,6 +5,7 @@ > #include > #include > #include > +#include > #include > #include > #include > @@ -35,9 +36,6 @@ > (type *)((char *)__mptr - offsetof(type, member)); }) > #endif > > -#define BUILD_BUG_ON(condition) ((void)sizeof(char[1 - 2*!!(condition)])) > -#define BUILD_BUG_ON_ZERO(e) (sizeof(struct { int:-!!(e); })) > - > #ifndef max > #define max(x, y) ({ \ > typeof(x) _max1 = (x); \ > diff --git a/tools/include/vdso/bits.h b/tools/include/vdso/bits.h > new file mode 100644 > index 000000000000..6d005a1f5d94 > --- /dev/null > +++ b/tools/include/vdso/bits.h > @@ -0,0 +1,9 @@ > +/* SPDX-License-Identifier: GPL-2.0 */ > +#ifndef __VDSO_BITS_H > +#define __VDSO_BITS_H > + > +#include > + > +#define BIT(nr) (UL(1) << (nr)) > + > +#endif /* __VDSO_BITS_H */ > diff --git a/tools/perf/check-headers.sh b/tools/perf/check-headers.sh > index c905c683606a..cf147db4e5ca 100755 > --- a/tools/perf/check-headers.sh > +++ b/tools/perf/check-headers.sh > @@ -22,6 +22,7 @@ include/uapi/linux/usbdevice_fs.h > include/uapi/linux/vhost.h > include/uapi/sound/asound.h > include/linux/bits.h > +include/vdso/bits.h > include/linux/const.h > include/vdso/const.h > include/linux/hash.h > @@ -116,6 +117,7 @@ check arch/x86/lib/memcpy_64.S '-I "^EXPORT_SYMBOL" -I "^#include check arch/x86/lib/memset_64.S '-I "^EXPORT_SYMBOL" -I "^#include " -I"^SYM_FUNC_START\(_LOCAL\)*(memset_\(erms\|orig\))"' > check include/uapi/asm-generic/mman.h '-I "^#include <\(uapi/\)*asm-generic/mman-common\(-tools\)*.h>"' > check include/uapi/linux/mman.h '-I "^#include <\(uapi/\)*asm/mman.h>"' > +check include/linux/build_bug.h '-I "^#\(ifndef\|endif\)\( \/\/\)* static_assert$"' > check include/linux/ctype.h '-I "isdigit("' > check lib/ctype.c '-I "^EXPORT_SYMBOL" -I "^#include " -B' > check arch/x86/include/asm/inat.h '-I "^#include [\"<]\(asm/\)*inat_types.h[\">]"' > -- Regards, Vincenzo