From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by dpdk.space (Postfix) with ESMTP id 8F325A00E6 for ; Mon, 13 May 2019 15:14:47 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 1EF444C95; Mon, 13 May 2019 15:14:46 +0200 (CEST) Received: from mail-wr1-f65.google.com (mail-wr1-f65.google.com [209.85.221.65]) by dpdk.org (Postfix) with ESMTP id 187892BC1 for ; Mon, 13 May 2019 15:14:45 +0200 (CEST) Received: by mail-wr1-f65.google.com with SMTP id r4so15203439wro.10 for ; Mon, 13 May 2019 06:14:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=6wind.com; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=glh4/YoBVVdHL4+/OnH9MMSztrrtjTO2067XkAkQhGo=; b=GKSwzoAa9cpOyAZJ5ngysRSz6bQy9O+6h3W51DbHXRV09wrw9wmhue3VoChGJjANuy GpcA5AIxnsxb8zfPvwQ/+21uztYcDcheJQPFWVLhFyPMsNBo1YqoI8robE9y4CJQo6zw Uor37rR8TpEofmq8cJHeQ6UeJ4XY/YKP3omQrVFa3CY5XA1roOrdLaX+tzMqFfOkyRU8 WVaj/LhbsVTzNLhgMn9HIQm9z3j6QRhSZ5nP2v9ghVDhlvw0Fx9k2HtKBOQzghgYm0kf eK+GnJWnn2XXxBSrvg5GDWDjooLlV2l1JrrKTcU3v5730s8Gg66S8s4GbBwlZru0qWif TVtw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=glh4/YoBVVdHL4+/OnH9MMSztrrtjTO2067XkAkQhGo=; b=Lil5cjdhO1cdBqQZ3EM6JWxlIX2V/fnENbyZjCYcdaxd8j6HeD1e3JCK30sqIK2nsg AMeAXeit1eSSexJrpet4gjNGXONhMCUuGxXDg6i53IlN8fNWk5+asLs2DnBRogQuE2GR hdGeJfWsk7gtC08LJNN2NtegIbJIuY1TUKuxK24ByWDC50BKlXmlHjo7f0q9k15lpIIX 4dvHPRfpt0NSk73sS4qk+e6aS8KHsR1S9RKqw5hROs+Q5XJjn2FA2n50N0YyL3HzxbVs bzCOLyZ3ZjDyqZz4G21X5VqSVLIX3SOm0nlRkvE+Caw8dR9cbjNjzgPsCxFKLoHMISWP eMng== X-Gm-Message-State: APjAAAU+kyz1WAzA5t3aZ5TDPGwZxgtvWXLPcISmzd/4zMc6Ei3WPOsG GZAWwuCcLc3aLd+it49cxHLv6g== X-Google-Smtp-Source: APXvYqzwBAf+WH1CfWtEFf5Rb6gVhw4enDw1G0s52UT5Gg++6QSuKGGJgi1ayaSYcNNfnuzBNJzufA== X-Received: by 2002:a05:6000:1250:: with SMTP id j16mr17085226wrx.200.1557753284632; Mon, 13 May 2019 06:14:44 -0700 (PDT) Received: from 6wind.com (host.78.145.23.62.rev.coltfrance.com. [62.23.145.78]) by smtp.gmail.com with ESMTPSA id l16sm22466631wrb.40.2019.05.13.06.14.43 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 13 May 2019 06:14:43 -0700 (PDT) Date: Mon, 13 May 2019 15:14:42 +0200 From: Adrien Mazarguil To: "Ananyev, Konstantin" Cc: "Smoczynski, MarcinX" , Thomas Monjalon , "dev@dpdk.org" , "Richardson, Bruce" , "shahafs@mellanox.com" , "gaetan.rivet@6wind.com" , "matan@mellanox.com" Message-ID: <20190513131442.GK4284@6wind.com> References: <2F25558C1648FA498380EAC12A8612624FD953@HASMSX110.ger.corp.intel.com> <9076832.UKkv39EgZr@xps> <2604468.nBFxeWxGDx@xps> <2F25558C1648FA498380EAC12A86126251F3B2@HASMSX110.ger.corp.intel.com> <20190513102510.GJ4284@6wind.com> <2601191342CEEE43887BDE71AB9772580161631159@irsmsx105.ger.corp.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline In-Reply-To: <2601191342CEEE43887BDE71AB9772580161631159@irsmsx105.ger.corp.intel.com> Subject: Re: [dpdk-dev] Using _XOPEN_SOURCE macros may break builds on FreeBSD X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Message-ID: <20190513131442.88QfKx2zWKR6aPmpCNkhzntoB7d6oMapcNgpNVRTL4k@z> Hey Konstantin, On Mon, May 13, 2019 at 10:49:00AM +0000, Ananyev, Konstantin wrote: > Hi Adrien, > > > > > On Mon, May 13, 2019 at 09:51:24AM +0000, Smoczynski, MarcinX wrote: > > > 10/05/2019 20:17, Thomas Monjalon: > > > > 10/05/2019 19:14, Smoczynski, MarcinX: > > > > > To summarize we have different visibility sets for Linux and BSD > > > > > when using XOPEN_SOURCE or POSIX_C_SOURCE explicitly. To overcome > > > > > this situation we can either remove problematic XOPEN macros from > > > > > mk/meson rules (drivers/net/failsafe, drivers/net/mlx4, > > > > > drivers/net/mlx5) > > > > > > > > What is the consequence of removing these macros in mlx and failsafe PMDs? > > > > > > The purpose of these *_SOURCE constants is to enable particular feature sets > > > visibility. As long as we have GNU_SOURCE on Linux removing it won't have any > > > consequences. On BSD it will unify feature sets visibility with the rest of > > > sources. Can't think of any downsides here. > > > > > > I believe XOPEN_SOURCE was introduced to extend features not to restrict them. > > > > I confirm that under Linux, all IPPROTO_* (POSIX/XOPEN/RFC1700) are defined > > regardless (_GNU_SOURCE not even needed), while under FreeBSD, the non-POSIX > > versions are only defined when __BSD_VISIBLE is set. > > > > The FreeBSD behavior is more correct in this respect since the purpose of > > _XOPEN_SOURCE and friends is also to let applications limit the risk of > > redefinitions in case they were written for an earlier standard > > (e.g. -D_XOPEN_SOURCE=500 vs. -D_XOPEN_SOURCE=600). > > Still not sure why do you need it for failsafe and mlx PMDs? > Would something in these PMDs be broken without '-D_XOPEN_SOURCE=600'? Well, not really. At least not anymore if they compile fine without it on all supported targets. I don't mind if they are removed from PMDs. _XOPEN_SOURCE=600 was originally added to mlx4 (later inherited by mlx5 and failsafe) for the following reasons: - Out fo habit, since a lot of stuff in unistd.h and fcntl.h depends on it to be exposed. Some affected definitions were likely needed at some point. - Besides toggling C syntax extensions, forcing a C standard through the -std parameter (e.g. -std=c99) in order to guarantee a minimum level of C compliance disables the implicit presence of nonstandard definitions, which must be re-enabled as needed through the appropriate #defines. For instance, including unistd.h for getsid() stops working as soon as you use -std=c99. On Linux you can get it back through -std=gnu99 or by combining -std=c99 with -D_GNU_SOURCE or -D_XOPEN_SOURCE. The latter was chosen because it is the standard define supposed to work across OSes. Historically mlx4 had to enable -std=c99 to be able to use various features not present when GCC defaulted to -std=gnu90. It was later transformed to -std=c11 for similar reasons (anonymous members in structs/unions if memory serves me right). > > DPDK applications may also define _XOPEN_SOURCE for their own needs. They > > should still be able to use rte_ip.h afterward. > > I suppose they can, they would just have (on FreeBSD) to add '-D __BSD_VISIBLE' > themselves. Of course, but public headers should be as self sufficient as possible. Unless they provide really insane compiler flags, if user applications get compilation errors after including some header we install on the system, I think the blame is on DPDK. > > I think this reason is > > enough to go with -D__BSD_VISIBLE under FreeBSD without removing > > _XOPEN_SOURCE, as it should work regardless. > > So do you suggest to add '-D __BSD_VISIBLE' into > mlx/failsafe PMDs Makefiles/meson.build, or ... ? Since headers of our public API potentially require it, it must be defined globally (unlike _XOPEN_SOURCE which is only local to a few PMDs): app/meson.build, lib/meson.build, mk/target/generic/rte.vars.mk, alongside -D_GNU_SOURCE. Add it to mlx*/failsafe only if that's not enough. Just make sure applications inherit this flag. > > Looking at the patch [1], I also think there's another, simpler approach: > > unless really performance critical, defining rte_ipv6_get_next_ext() in > > rte_net.c instead of a static inline in rte_ip.h should address this issue. > > It is performance critical, and I think that > function call for each ext header is a way too expensive approach. > Will prefer to keep that function inline. OK, a bit cumbersome but since we're heading this way [2], how about defining our own instead of all the above? #define RTE_IPPROTO_HOPOPTS 0 #define RTE_IPPROTO_ROUTING 43 ... Which could prove handy later as it appears Linux and FreeBSD don't have the same set of available IPPROTO_* definitions. Thoughts? [2] "[RFC v2 00/14] prefix network structures" https://mails.dpdk.org/archives/dev/2019-April/129752.html -- Adrien Mazarguil 6WIND