On Thu, Feb 8, 2018 at 10:44 AM, Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx> wrote: > 2018-02-08 2:55 GMT+09:00 Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>: >> What I would really want - and this is entirely unrelated to this >> particular case - is to have those damn compiler option tests as part >> of the config phase in general. We now have about a million of these >> crazy things, where we have config options that simply depend on which >> compiler we have, and we have no sane way to show them at >> configuration time. >> >> Though Andrew's tree I got yet another ugly hack >> (CONFIG_CC_STACKPROTECTOR_AUTO) that handles just _one_ special case >> by turning it into a special magic Kconfig entry in the main Makefile. >> See commit 44c6dc940b19 ("Makefile: introduce >> CONFIG_CC_STACKPROTECTOR_AUTO"). I wasn't sure if I really wanted it, >> and honestly, I'm still thinking of just reverting it, because it's >> _so_ ugly and _so_ wrong. >> >> What we need is an extension to the Kconfig language itself so that we can do >> >> config CC_HAS_RETPOLINE >> cc_option "-mindirect-branch=thunk -mindirect-branch-table" >> >> or something. And then we can make sane _conditional_ dependencies at >> Kconfig time, and our makefiles would be much cleaner too when you >> could just do >> >> cflags-$(USE_RETPOLINE) += -mfunction-return=thunk -mindirect-branch-table >> >> because the validity of the C compiler flag has been tested when configuring. >> >> And then we could add that warning at configure time (or just disable >> the option there thanks to "depends on CC_HAS_xyz" logic). >> >> All our compiler option handling right now is just nasty nasty nasty crud. >> >> Adding more people in the hopes that somebody gets motivated.. I've >> talked about this before, so far we haven't made any progress. > > > Sorry for slow progress. > > I agreed this before, and still motivated. > (because I also motivated to remove kbuild cache. > This turned out not so clever as I first thought) > > I was trying to do this, but in this development cycle > I spent most of my time to flush out lots of piled up Kconfig patches. > Sorry. > > Unless somebody is working, I will. FWIW, I did try to do this before I went with the STACKPROTECTOR_AUTO solution, and it defeated me at every turn. Between the circular dependency of the Makefile setting up KBUILD flags and Kconfig wanting to know about the compiler, I got stuck. And it also seemed like the cache was a problem too, as I couldn't find a way to re-evaluate the script-controlled CONFIG items once it got cached. And ultimately, a lot of the operational logic ended up sticking around in the Makefile anyway (to provide fallback decisions, warns, and errors). To correctly deal with the complex corner-cases for stack-protector, I end up with three pieces: the user config: - do you want auto, weak, strong, or off? the compiler tests: - which of weak, strong, or off are supported? - does the flag _actually produce working code_ for this architecture/compiler version/etc? and the build behavior: - for auto, choose best available flag and warn if none - for user-selected weak or strong, stop if unavailable/non-functional - for off (or auto-none) use the "off" flag, if it is supported (to force-disable it on ssp-by-default distro compilers) And all of this needs to bypass the Kconfig cache, since if it gets cached, it won't get re-evaluated when a selection is changed. If we had a working "option shell $(CC) ..." then I could do the "compiler tests" part in Kconfig, and I could probably do the bulk of the "build behavior" logic in Kconfig too, though any intermediate configs would need to avoid getting cached too. The ssp handling has always been extremely complex due to all its gory details, but I've tried _really_ hard to improve it, keep it documented, and in one place (e.g. the compiler tests used to be stuffed in per-arch Makefile). -Kees -- Kees Cook Pixel Security -- To unsubscribe from this list: send the line "unsubscribe linux-s390" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html