From: paulmck@linux.vnet.ibm.com (Paul E. McKenney)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v2 18/18] arm64: select ARCH_SUPPORTS_LTO_CLANG
Date: Thu, 16 Nov 2017 10:39:51 -0800 [thread overview]
Message-ID: <20171116183950.GA3624@linux.vnet.ibm.com> (raw)
In-Reply-To: <CAKwvOdkDz1yRo=Skt_mWxs0uucK+adXx8kFQksMbTE3ofnpUMQ@mail.gmail.com>
On Thu, Nov 16, 2017 at 10:16:22AM -0800, Nick Desaulniers wrote:
> On Thu, Nov 16, 2017 at 9:48 AM, Paul E. McKenney
> <paulmck@linux.vnet.ibm.com> wrote:
> > On Thu, Nov 16, 2017 at 06:34:17PM +0100, Peter Zijlstra wrote:
> >> On Thu, Nov 16, 2017 at 09:16:49AM -0800, Nick Desaulniers wrote:
> >> > On Thu, Nov 16, 2017 at 8:59 AM, Peter Zijlstra <peterz@infradead.org> wrote:
> >> > > On Thu, Nov 16, 2017 at 08:50:41AM -0800, Nick Desaulniers wrote:
> >> > >> On Thu, Nov 16, 2017 at 8:30 AM, Peter Zijlstra <peterz@infradead.org> wrote:
> >> > >>
> >> > >> > Ideally we'd get the toolchain people to commit to supporting the kernel
> >> > >> > memory model along side the C11 one. That would help a ton.
> >> > >>
> >> > >> Does anyone from the kernel side participate in the C standardization process?
> >> > >
> >> > > Yes, Paul McKenney and Will Deacon. Doesn't mean these two can still be
> >> > > reconciled though. From what I understand C11 (and onwards) are
> >> > > incompatible with the kernel model on a number of subtle points.
> >> >
> >> > It would be good to have these incompatibilities written down, then
> >> > for the sake of argument, they can be cited both for discussions on
> >> > LKML and in the C standardization process. For example, a running
> >> > list in Documentation/ or something would make it so that anyone could
> >> > understand and cite current issues with the latest C standard.
> >>
> >> Will should be able to produce this list; I know he's done before, I
> >> just can't find it -- my Google-foo isn't strong today.
> >
> > Here you go:
> >
> > http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2017/p0124r4.html
>
> Great, thanks! Will take some time to digest, but happy to refer
> others to this important work in the future.
Glad you like it!
> I wonder if we have anything like a case study that shows specifically
> how a compiler generated a subtle bug due to specifics of the memory
> model, like a "if you do this, here's the problematic code that will
> get generated, and why it's problematic due to the memory model."
> That may be a good way to raise issues with toolchain developers with
> concrete and actionable examples.
Well, the above is an official working paper from the C++ standards
committee.
The first priority is to fix memory_order_consume. Which is getting a
bit more mindshare of late. As Fedor Pikus said at CPPCON: "If you have
a large software project, you are probably already using RCU. But you
don't know that you are using it, and you are probably doing it wrong."
> >> > I don't understand why we'd block patches for enabling experimental
> >> > features. We've been running this patch-set on actual devices for
> >> > months and would love to provide them to the community for further
> >> > testing. If bugs are found, then there's more evidence to bring to
> >> > the C standards committee. Otherwise we're shutting down feature
> >> > development for the sake of potential bugs in a C standard we're not
> >> > even using.
> >>
> >> So the problem is that its very very hard (and painful) to find these
> >> bugs. Getting the tools people to comment on these specific
> >> optimizations would really help lots.
>
> No doubt; I do not disagree with you. Kernel developers have very
> important use cases for the language.
>
> But the core point I'm trying to make is "do we need to block this
> patch set until issues with the C standards body in regards to the
> kernels memory model are resolved?" I would hope the two are
> orthogonal and that we'd take them and then test them even more
> extensively than the developer has in order to find out.
Given that I have been working on getting the C and C++ standards to
correctly handle rcu_dereference() for more than ten years, I recommend
-against- waiting on standardization in the strongest possible terms.
And if you think that ten years is bad, the Java standards community has
been struggling with out-of-thin-air (OOTA) values for almost 20 years.
And the C and C++ standards haven't solved OOTA, either.
Thanx, Paul
> > It would be good to get something similar to LKMM into KTSAN, for
> > example. There would probably be a few differences due to efficiency
> > concerns, but closer is better than less close. ;-)
>
> + glider, who may be able to comment on the state of KTSAN.
>
next prev parent reply other threads:[~2017-11-16 18:39 UTC|newest]
Thread overview: 103+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-11-15 21:34 [PATCH v2 00/18] Add support for clang LTO Sami Tolvanen
2017-11-15 21:34 ` [PATCH v2 01/18] kbuild: add ld-name macro and support for GNU gold Sami Tolvanen
2017-11-15 21:53 ` Kees Cook
2017-11-15 21:34 ` [PATCH v2 02/18] kbuild: fix LD_DEAD_CODE_DATA_ELIMINATION with " Sami Tolvanen
2017-11-15 21:34 ` [PATCH v2 03/18] kbuild: move gcc-version.sh to cc-version.sh and add clang support Sami Tolvanen
2017-11-15 21:48 ` Kees Cook
2017-11-15 22:06 ` Sami Tolvanen
2017-11-15 21:34 ` [PATCH v2 04/18] arm64: use -mno-implicit-float instead of -mgeneral-regs-only Sami Tolvanen
2017-11-15 21:34 ` [PATCH v2 05/18] arm64: fix -m for GNU gold Sami Tolvanen
2017-11-16 10:55 ` Yury Norov
2017-11-16 16:55 ` Nick Desaulniers
2017-11-15 21:34 ` [PATCH v2 06/18] arm64: kvm: use -fno-jump-tables with clang Sami Tolvanen
2017-11-16 11:46 ` Will Deacon
2017-11-16 16:25 ` Sami Tolvanen
2017-11-20 14:41 ` Mark Rutland
2017-11-20 14:43 ` Mark Rutland
2017-11-20 14:47 ` Ard Biesheuvel
2017-11-15 21:34 ` [PATCH v2 07/18] arm64: keep .altinstructions and .altinstr_replacement Sami Tolvanen
2017-11-15 21:34 ` [PATCH v2 08/18] arm64: don't disable ADR_PREL_PG_HI21* with ARM64_ERRATUM_843419 Sami Tolvanen
2017-11-15 22:29 ` Ard Biesheuvel
2017-11-16 11:44 ` Will Deacon
2017-11-16 16:32 ` Sami Tolvanen
2017-11-16 16:34 ` Ard Biesheuvel
2017-11-16 21:37 ` Sami Tolvanen
2017-11-16 22:14 ` Ard Biesheuvel
2017-11-16 22:25 ` Ard Biesheuvel
2017-11-16 23:09 ` Sami Tolvanen
2017-11-16 23:20 ` Ard Biesheuvel
2017-11-16 23:50 ` Sami Tolvanen
2017-11-17 9:54 ` Ard Biesheuvel
2017-11-17 18:49 ` Sami Tolvanen
2017-11-15 21:34 ` [PATCH v2 09/18] arm64: explicitly pass --no-fix-cortex-a53-843419 to GNU gold Sami Tolvanen
2017-11-16 11:47 ` Will Deacon
2017-11-16 16:35 ` Sami Tolvanen
2017-11-20 14:47 ` Mark Rutland
2017-11-20 20:35 ` Sami Tolvanen
2017-11-21 11:15 ` Mark Rutland
2017-11-15 21:34 ` [PATCH v2 10/18] arm64: add a workaround for GNU gold with ARM64_MODULE_PLTS Sami Tolvanen
2017-11-16 11:50 ` Will Deacon
2017-11-16 16:41 ` Sami Tolvanen
2017-11-16 18:47 ` Will Deacon
2017-11-15 21:34 ` [PATCH v2 11/18] arm64: make mrs_s and msr_s macros work with LTO Sami Tolvanen
2017-11-16 11:54 ` Will Deacon
2017-11-16 13:07 ` Yury Norov
2017-11-16 13:55 ` Robin Murphy
2017-11-16 21:29 ` Yury Norov
2017-11-16 22:54 ` Alex Matveev
2017-12-04 17:34 ` Nick Desaulniers
2017-11-16 13:56 ` Segher Boessenkool
2017-11-16 16:46 ` Sami Tolvanen
2017-11-16 17:01 ` Segher Boessenkool
2017-11-16 17:11 ` Sami Tolvanen
2017-11-16 16:43 ` Sami Tolvanen
2017-11-16 16:44 ` Nick Desaulniers
2017-11-16 18:14 ` Alex Matveev
2017-11-15 21:34 ` [PATCH v2 12/18] kbuild: add support for clang LTO Sami Tolvanen
2017-11-15 22:06 ` Kees Cook
2017-11-18 3:21 ` [v2,12/18] " Nicholas Piggin
2017-11-20 20:21 ` Sami Tolvanen
2017-11-21 1:01 ` Nicholas Piggin
2017-11-29 23:30 ` Sami Tolvanen
2017-11-15 21:34 ` [PATCH v2 13/18] kbuild: fix dynamic ftrace with " Sami Tolvanen
2017-11-15 21:34 ` [PATCH v2 14/18] scripts/mod: disable LTO for empty.c Sami Tolvanen
2017-11-15 21:34 ` [PATCH v2 15/18] efi/libstub: disable LTO Sami Tolvanen
2017-11-15 21:34 ` [PATCH v2 16/18] arm64: crypto: disable LTO for aes-ce-cipher.c Sami Tolvanen
2017-11-20 15:20 ` Mark Rutland
2017-11-20 15:25 ` Ard Biesheuvel
2017-11-20 21:01 ` Sami Tolvanen
2017-11-21 11:47 ` Mark Rutland
2017-11-20 20:51 ` Sami Tolvanen
2017-11-20 21:29 ` Alex Matveev
2017-11-20 21:31 ` Ard Biesheuvel
2017-11-20 22:03 ` Alex Matveev
2017-11-15 21:34 ` [PATCH v2 17/18] arm64: disable RANDOMIZE_MODULE_REGION_FULL with LTO_CLANG Sami Tolvanen
2017-11-15 21:34 ` [PATCH v2 18/18] arm64: select ARCH_SUPPORTS_LTO_CLANG Sami Tolvanen
2017-11-16 11:58 ` Will Deacon
2017-11-16 16:17 ` Sami Tolvanen
2017-11-16 16:30 ` Peter Zijlstra
2017-11-16 16:50 ` Nick Desaulniers
2017-11-16 16:59 ` Peter Zijlstra
2017-11-16 17:16 ` Nick Desaulniers
2017-11-16 17:34 ` Peter Zijlstra
2017-11-16 17:48 ` Paul E. McKenney
2017-11-16 18:16 ` Nick Desaulniers
2017-11-16 18:39 ` Paul E. McKenney [this message]
2017-11-16 18:45 ` Will Deacon
2017-11-16 19:13 ` Paul E. McKenney
2017-11-16 20:17 ` Sami Tolvanen
2017-11-20 18:05 ` Will Deacon
2017-11-20 19:25 ` Peter Zijlstra
2017-11-20 19:28 ` Peter Zijlstra
2017-11-20 20:52 ` Paul E. McKenney
2017-11-20 19:32 ` Peter Zijlstra
2017-11-20 20:53 ` Paul E. McKenney
2017-11-21 17:23 ` David Laight
2017-11-21 18:51 ` Paul E. McKenney
2017-11-23 13:42 ` Alexander Potapenko
2017-11-24 7:52 ` Dmitry Vyukov
2017-11-16 20:53 ` [PATCH v2 00/18] Add support for clang LTO Yury Norov
2017-11-16 21:38 ` Sami Tolvanen
2017-11-20 15:21 ` Mark Rutland
2017-11-20 21:04 ` Sami Tolvanen
2017-11-21 11:53 ` Mark Rutland
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20171116183950.GA3624@linux.vnet.ibm.com \
--to=paulmck@linux.vnet.ibm.com \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).