From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,URIBL_SBL,URIBL_SBL_A, USER_AGENT_MUTT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id ED23FC04AB5 for ; Thu, 6 Jun 2019 13:43:36 +0000 (UTC) Received: from dpdk.org (dpdk.org [92.243.14.124]) by mail.kernel.org (Postfix) with ESMTP id 69FA82067C for ; Thu, 6 Jun 2019 13:43:36 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 69FA82067C Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=tuxdriver.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=dev-bounces@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id B06781B993; Thu, 6 Jun 2019 15:43:35 +0200 (CEST) Received: from smtp.tuxdriver.com (charlotte.tuxdriver.com [70.61.120.58]) by dpdk.org (Postfix) with ESMTP id 6338B1B974 for ; Thu, 6 Jun 2019 15:43:34 +0200 (CEST) Received: from cpe-2606-a000-111b-405a-0-0-0-162e.dyn6.twc.com ([2606:a000:111b:405a::162e] helo=localhost) by smtp.tuxdriver.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.63) (envelope-from ) id 1hYsfv-00030h-7Q; Thu, 06 Jun 2019 09:43:30 -0400 Date: Thu, 6 Jun 2019 09:43:00 -0400 From: Neil Horman To: "Wiles, Keith" Cc: Jerin Jacob Kollanukkaran , "Richardson, Bruce" , "dev@dpdk.org" , Thomas Monjalon Message-ID: <20190606134300.GC29521@hmswarspite.think-freely.org> References: <20190525184346.27932-1-nhorman@tuxdriver.com> <20190605164541.GH1550@bricha3-MOBL.ger.corp.intel.com> <20190605181108.GC554@hmswarspite.think-freely.org> <20190606113422.GA29521@hmswarspite.think-freely.org> <015190E6-5703-40E2-9CBE-DAB3DA74669B@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <015190E6-5703-40E2-9CBE-DAB3DA74669B@intel.com> User-Agent: Mutt/1.11.3 (2019-02-01) Subject: Re: [dpdk-dev] [EXT] [RFC PATCH 0/2] introduce __rte_internal tag X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" On Thu, Jun 06, 2019 at 01:18:29PM +0000, Wiles, Keith wrote: > > > > On Jun 6, 2019, at 7:04 AM, Jerin Jacob Kollanukkaran wrote: > > > >> -----Original Message----- > >> From: Neil Horman > >> Sent: Thursday, June 6, 2019 5:04 PM > >> To: Jerin Jacob Kollanukkaran > >> Cc: Bruce Richardson ; dev@dpdk.org; > >> Thomas Monjalon > >> Subject: Re: [EXT] [RFC PATCH 0/2] introduce __rte_internal tag > >> > >> On Thu, Jun 06, 2019 at 09:44:52AM +0000, Jerin Jacob Kollanukkaran wrote: > >>>> -----Original Message----- > >>>> From: Neil Horman > >>>> Sent: Wednesday, June 5, 2019 11:41 PM > >>>> To: Bruce Richardson > >>>> Cc: Jerin Jacob Kollanukkaran ; dev@dpdk.org; > >>>> Thomas Monjalon > >>>> Subject: Re: [EXT] [RFC PATCH 0/2] introduce __rte_internal tag > >>>> > >>>> On Wed, Jun 05, 2019 at 05:45:41PM +0100, Bruce Richardson wrote: > >>>>> On Wed, Jun 05, 2019 at 04:24:09PM +0000, Jerin Jacob > >>>>> Kollanukkaran > >>>> wrote: > >>>>>>> -----Original Message----- > >>>>>>> From: Neil Horman > >>>>>>> Sent: Sunday, May 26, 2019 12:14 AM > >>>>>>> To: dev@dpdk.org > >>>>>>> Cc: Neil Horman ; Jerin Jacob > >>>>>>> Kollanukkaran ; Bruce Richardson > >>>>>>> ; Thomas Monjalon > >>>>>>> > >>>>>>> Subject: [EXT] [RFC PATCH 0/2] introduce __rte_internal tag > >>>>>>> > >>>>>>> Hey- > >>>>>>> Based on our recent conversations regarding the use of > >>>>>>> symbols only meant for internal dpdk consumption (between dpdk > >>>>>>> libraries), this is an idea that I've come up with that I'd > >>>>>>> like to get some feedback on > >>>>>>> > >>>>>>> Summary: > >>>>>>> 1) We have symbols in the DPDK that are meant to be used > >>>>>>> between DPDK libraries, but not by applications linking to > >>>>>>> them > >>>>>>> 2) We would like to document those symbols in the code, so as > >>>>>>> to note them clearly as for being meant for internal use only > >>>>>>> 3) Linker symbol visibility is a very coarse grained tool, and > >>>>>>> so there is no good way in a single library to mark items as > >>>>>>> being meant for use only by other DPDK libraries, at least not > >>>>>>> without some extensive runtime checking > >>>>>>> > >>>>>>> > >>>>>>> Proposal: > >>>>>>> I'm proposing that we introduce the __rte_internal tag. From > >>>>>>> a coding standpoint it works a great deal like the > >>>>>>> __rte_experimental tag in that it expempts the tagged symbol > >>>>>>> from ABI constraints (as the only users should be represented > >>>>>>> in the DPDK build environment). Additionally, the > >>>>>>> __rte_internal macro resolves differently based on the > >>>>>>> definition of the BUILDING_RTE_SDK flag (working under the > >>>>>>> assumption that said flag should only ever be set if we are > >>>>>>> actually building DPDK libraries which will make use of > >>>>>>> internal calls). If the BUILDING_RTE_SDK flag is set > >>>>>>> __rte_internal resolves to __attribute__((section > >>>>>>> "text.internal)), placing it in a special text section which > >>>>>>> is then used to validate that the the symbol appears in the > >>>>>>> INTERNAL section of the corresponding library version map). > >>>>>>> If BUILDING_RTE_SDK is not set, then __rte_internal resolves > >>>>>>> to > >>>> __attribute__((error("..."))), which causes any caller of the tagged > >>>> function to throw an error at compile time, indicating that the > >>>> symbol is not available for external use. > >>>>>>> > >>>>>>> This isn't a perfect solution, as applications can still hack > >>>>>>> around it of course, > >>>>>> > >>>>>> I think, one way to, avoid, hack around could be to, > >>>>>> > >>>>>> 1) at config stage, create a random number for the build > >>>>>> 2) introduce RTE_CALL_INTERNAL macro for calling internal > >>>>>> function, compare the generated random number for allowing the > >>>>>> calls to make within the library. i.e leverage the fact that > >>>>>> external library would never know the random number generated > >>>>>> for the DPDK build > >>>> and internal driver code does. > >>>>>> > >>>>> Do we really need to care about this. If have some determined > >>>>> enough to hack around our limitations, then they surely know that > >>>>> they have an unsupported configuration. We just need to protect > >>>>> against inadvertent use of internals, IMHO. > >>>>> > >>>> I agree, I too had thought about doing some sort of internal runtime > >>>> checking to match internal only symbols, such that they were only > >>>> accessable by internally approved users, but it started to feel like a great > >> deal of overhead. > >>>> Its a good idea for a general mechanism I think, but I believe the > >>>> value here is more to internally document which apis we want to mark > >>>> as being for internal use only, and create a lightweight roadblock > >>>> at build time to catch users inadvertently using them. Determined > >>>> users will get around anything, and theres not much we can do to stop > >> them. > >>> > >>> I agree too. IMHO, Simply having following items would be enough > >>> > >>> 1) Avoid exposing the internal function prototype through public > >>> header files > >>> 2) Add @internal to API documentation > >>> 3) Just decide the name space for internal API for tooling(i.e not > >>> start with rte_ or so) Using objdump scheme to detect internal functions > >> requires the the library to build prior to run the checkpatch. > >>> > >> > >> No, I'm not comfortable with that approach, and I've stated why: > >> 1) Not exposing the functions via header files is a fine start > >> > >> 2) Adding internal documentation is also fine, but does nothing to correlate > >> the code implementing those functions to the documentation. Its valuable > >> to have a tag on a function identifying it as internal only. > >> > >> 3) Using naming conventions to separate internal only from non-internal > >> functions is a vague approach, requiring future developers to be cogniscent > >> of the convention and make the appropriate naming choices. It also implicitly > >> restricts the abliity for future developers to make naming changes in conflict > >> with that convention > > > > Enforcing the naming convention can be achieved through tooling as well. > > > >> > >> 4) Adding a tag like __rte_internal creates an interlock whereby, not only are > >> internal functions excused from ABI constraints, but forces developers to > >> intentionally mark their internal functions as being internal in the code, which > >> is beneficial to clarlity of understanding during the development process. > > > > No issues in adding __rte_internal. But, I am against current implementaion, > > Ie. adding objdump dependency > > to checkpatch i.e developer has to build the library first so that checkpatch can > > can know, Is it belongs to internal section or not? > > > >> > >> 5) Adding a tag like __rte_internal is explicit, and allows developers to use a > >> single header file instead of multiple header files if they so choose > >> > >> We went through this with experimental symbols as well[1], and it just > >> makes more sense to me to clearly document in the code what constitutes > >> an internal symbol rather than relying on naming conventions and hoping > >> that developers read the documentation before exporting a symbol > >> publically. > > I feel like we are creating a lot of extra work for the developer and adding a number of constraints to getting code patches submitted as the tools all have to be working together. The versioning file and __rte_experimental stuff today has always being handle wrong or not done by the developer. Altering the tools to detect these changes works and it seemed to take a while to iron out. To me we should be doing the minimum steps to reasonably isolate internal API and data from the user. If someone wants to access the those APIs that is their choice and enforcing with new macros and tools is over kill IMHO. > > 1) Adding @internal to documentation is a great start along with more docs to explain what internal functions/data should be handled. I've got no issue with this > 2) Hiding/moving internal function prototypes in private headers. Nor this, though if you want to do it, ensuring that every library has a private header that doesn't get exported has to be part of the review process, and I'm not confident that that will be a focus of anyones review > 3) Adding setters/getters for internal data. Sure, no issue here > 4) Make sure we review and reject direct use of internal functions and data. How exactly do you intend to enforce this? By definition, the use of internal functions is restricted only to dpdk core libraries, and those are the only patches we ever see on the list. This change is meant to enforce usage prevention for users writing applications whos patches will never be seen for review (save for our example programs) We already have this mechanism available for experimental abi, and from my perspective it works quite well, and is fairly well understood. I don't see whats wrong with expanding that mechanism to internal functions. Neil > > The goal here is to handle the 80% rule and make it very obvious to the developer these are internal functions and data. Using these or similar minimum steps should be reasonable IMHO. > >> > >> > >> [1] https://mails.dpdk.org/archives/dev/2017-December/083828.html > >>>> > >>>> If we really wanted to go down that road, we could use a mechainsm > >>>> simmilar to the EXPORT_SYMBOL / EXPORT_SYMBOL_GPL infrastructure > >>>> that the kernel uses, but that would required building our own > >>>> custom linker script, which seems like overkill here. > >>>> > >>>> Best > >>>> Neil > >>>> > >>>>> /Bruce > > Regards, > Keith > >