Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix RPATHs for cc toolchain solib when sibling layout is used #17276

Closed
wants to merge 5 commits into from
Closed

Fix RPATHs for cc toolchain solib when sibling layout is used #17276

wants to merge 5 commits into from

Conversation

yuzhy8701
Copy link
Contributor

This should fix issue #16956

Includes the following changes:

  • Refactor logics to find runtime library search directories
  • Correctly compute RPATHs for toolchain solib.

* Extracts logic to find execroots as a separate method and moves it into the `collectLibrariesToLink()` method from the constructor.
* Extracts logic to create rpaths for toolchain libraries as a separate method.
* Reorganizes the logic for better readability.

This debloats the constructor and makes further changes easier.
@yuzhy8701 yuzhy8701 requested a review from lberki as a code owner January 20, 2023 01:29
@yuzhy8701
Copy link
Contributor Author

Still working on the tests for the 2nd commit (65a023b)

@yuzhy8701 yuzhy8701 marked this pull request as draft January 20, 2023 02:49
@yuzhy8701 yuzhy8701 marked this pull request as ready for review January 24, 2023 05:41
@yuzhy8701 yuzhy8701 requested a review from oquenchil as a code owner January 24, 2023 05:41
@yuzhy8701
Copy link
Contributor Author

@fmeum Could you help review this?

@ShreeM01 ShreeM01 added team-Rules-CPP Issues for C++ rules awaiting-review PR is awaiting review from an assigned reviewer labels Jan 24, 2023
}

@Test
public void dynamicLink_siblingLayout_externalBinary_rpath() throws Exception {
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It would be great to also have an integration test (probably in cc_integration_test.sh).

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Testing toolchain lib rpaths is a bit tricky.

  1. I need a cc_toolchain_config with static_link_cpp_runtimes turned on.
  2. I need a cc_toolchain that sets the dynamic/static_runtime_lib attributes with runtime libs (libc++ or libstdc++).
  3. Since an incorrect rpath does not fail the build, I have to run the binary to verify that it can correctly load the libs.

It seems that 1 and 2 are not supported by the auto-generated toolchain, so that I need to somehow replicate the default toolchain / config and do some modifications, right? Or I can create a custom toolchain - but since there's no hermetic compiler available, I'm not sure how far I could get.

3 means that I can't use a fake runtime lib (can I?), or the binary will fail to load as well. What I can think of is searching for them in the host (again since there is no hermetic compiler available) - I definitely don't want to pull llvm as a test dependency here.

Considering all these requirements, I'm not sure if it is worth the effort. Do you have any pointers for how to implement the test?

Copy link
Contributor

@oquenchil oquenchil Jan 27, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Unless I'm missing something --features=static_link_cpp_runtimes be enough for point 1.

Regarding point 2, would it be useful in the future to have a Starlark label-typed build setting that is able to override the dynamic_runtime_lib and the static_runtime_lib values (i.e. a command line option accepting a file target that overrides those attributes)? If that's actually something that would be widely useful, we could implement that once we starlarkify C++ configurations (or we could add it already with a native LateBoundDefault if it's something that would be really really useful).

If such a flag is not worth the complexity because it would only be useful for this test, I still feel like this should be checked in tested though even if it requires mocking a new toolchain.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

re: --features=static_link_cpp_runtimes, it's not working now. It seems that the static_link_cpp_runtimes feature is not defined in the default unix toolchain config, nor is it added by CppActionConfigs.getLegacyFeatures() because supportsEmbeddedRuntimes is set to false. The relevant commit is ad30d85. Maybe I could add the feature (but disabled) to unix_cc_toolchain_config.bzl, but not sure if it would cause undesirable effects.

re: point 2, one workaround would be duplicating the default cc_toolchain target (e.g. @local_config_cc//:cc-compiler-k8) and setting dynamic|static_runtime_lib on the copy (reusing the default cc_toolchain_config and dependencies). Not sure how good it works cross-platform, though. A config to override them would be welcome, but I'm not sure how wide it can be useful. (Here are a set of more general ideas that I think would be quite useful).

Would you be OK if I add the static_link_cpp_runtimes feature into unix_cc_toolchain_config.bzl (disabled by default)? I think it will be a different PR, though.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would you be OK if I add the static_link_cpp_runtimes feature into unix_cc_toolchain_config.bzl (disabled by default)? I think it will be a different PR, though.

Yes, that is a welcome change if that helps getting you there. If it's disabled by default it should be safe.

(#16520 (comment) are a set of more general ideas that I think would be quite useful).

I haven't spent time fully processing your ideas there but please take a look at
https://docs.google.com/document/d/1-etGNsPneQ8W7MBMxtLloEq-Jj9ng1G-Pip-cWtTg_Y/edit?pli=1#heading=h.5mcn15i0e1ch and tell me if that kind of solves the same problem you are trying to solve with those ideas.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

#17391 to add the feature.

Thanks for sharing the proposal! That doc fully covers points 2 and 3 in my comment regarding the toolchain, and mostly covers point 5 (although is a P2). It could potentially also cover point 1 (I left a comment on the proposal). The author mentioned in the document history that there will be another proposal for something similar to point 4 (I hope) - for me point 4 is a killer feature that I'm implementing with some custom rules but still rough due to limitations in the current cc_toolchain / cc_toolchain_config rules.

re: ideas about the build rules, they apparently belong to a separate proposal.

So yeah this proposal definitely overlaps with many of my ideas. Glad and can't wait to see the improvements there!

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think any of this unblocks you immediately though. Since I don't think we have a way of unblocking you right now and the only option is to add a lot of code for mocking the toolchain which may be discarded later once the better mechanisms are available, I'd be fine with a comment specifying what will be needed before we can have a test and that it will get written as soon as possible. Meanwhile we can check this in without a test.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let me know if I missed something and you can indeed add a test easily already or alternatively let me know if this PR doesn't block you and it can wait for quite a while till the cc_toolchain design is implemented.

If it needs to go in now already to unblock you, please just add the comment and I will approve.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added a TODO item in the test class.

I don't think there is an easy way to do that yet. This PR will block me soon so yeah let's get it merged.

Thank you all for the review @oquenchil @fmeum!

@oquenchil oquenchil self-assigned this Jan 27, 2023
yuzhy8701 and others added 2 commits February 3, 2023 13:49
When sibling repository layout is used, the toolchain solib directory is not co-located with the main solib (solib_<cpu>). Therefore, the RPATHs for toolchain solib need to be computed separately, in a similar manner as how they are computed for the main solib.

This change uses a private implementation of `getRelative()` function, rather than the `PathFragment.relativeTo()` method. The reason is that `PathFragment.relativeTo()` requires the base path to be a prefix which is not true in the cases here.

Fixes #16956
@oquenchil oquenchil added awaiting-PR-merge PR has been approved by a reviewer and is ready to be merge internally and removed awaiting-review PR is awaiting review from an assigned reviewer labels Feb 6, 2023
@yuzhy8701
Copy link
Contributor Author

The failing tests seem to be flakes.

@sgowroji sgowroji removed the awaiting-PR-merge PR has been approved by a reviewer and is ready to be merge internally label Feb 15, 2023
ShreeM01 added a commit that referenced this pull request Feb 17, 2023
This should fix issue #16956

Includes the following changes:

- Refactor logics to find runtime library search directories
- Correctly compute RPATHs for toolchain solib.

Closes #17276.

PiperOrigin-RevId: 509815187
Change-Id: I7f2a2412aea6430fa712dd2836e18f9536757753
(cherry picked from commit 773d232)

Co-authored-by: kshyanashree <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
team-Rules-CPP Issues for C++ rules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants