Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp5722638imm; Tue, 18 Sep 2018 14:32:26 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZZd/9LP39TsE1cMm5F9HdsrbYEqPvk1BpWPrS8TcUPmXt6esgYliyACpwf05OKUqsyiajM X-Received: by 2002:a62:642:: with SMTP id 63-v6mr32932287pfg.42.1537306346851; Tue, 18 Sep 2018 14:32:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537306346; cv=none; d=google.com; s=arc-20160816; b=g9h7PhPy2/II8/1wtWQxUVIxPvs5IjyUKmmuwdmfsIY3Z4mF2AUBvh6gLRJ++KjBsq i86wpVI/SGdK5+V6lKyLE6Yp2OQVI5uWiwsP0l0auFRhtgzEj+aaIpfEn+QekLqWNKNg ZEYVIWs7YLnvpd5SRZ7OvCK4oeZvkDnnHnX/9DVzS0Or1lGG3jRxVEjDhNlcN9R3i8te p6r+z7UFTTPAf39ZTIV8abe3cedkOS5qu63g9NsdRVPPJKybtdBwPO6WG8gtxdppWtd8 K9Q0g9VDHJnPSizhPCSq+f318zOTaKdU9ZoAeQUs9GVMAExlVVb+kTLl4vzqIA+HzEma 2j/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=LizzJBNxDseqjZBqFSVbve4bqfs2q9B33vkLl+OHkp4=; b=j8bFsnu9dt9INCBNjAwFvbsoNTUFEEqk9ziri2VMT4jqMWGBov77dIQyIYIRKCE0dr rs0r9Wf6vU3r8mtSwtG+72E+0V3vvmmki7fPBUwohHcKVmrtpM0+CB25IurHqnqgyTGm GVVQvxv5iKDGwnuGFzPAIGpPfQMaYdpwYJj0KJPwpTY12FTayNCAorgq0ISTV9jpJCe+ 5N0VK5EqGzyXR9oaRBONiWZ2Kp8k2uTXz/UtLAdUcdUFzQ+YHLCUUzn/XiiNvz47zihI peaixjbmNTOZqwgICcT29T6CdshdLDP5N0uoSfIBpknSlC0LaGjFmkWMrLPLae9VlPqQ I4bg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=vmware.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c17-v6si19500531pge.273.2018.09.18.14.32.11; Tue, 18 Sep 2018 14:32:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=vmware.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730540AbeISDFH (ORCPT + 99 others); Tue, 18 Sep 2018 23:05:07 -0400 Received: from ex13-edg-ou-001.vmware.com ([208.91.0.189]:56760 "EHLO EX13-EDG-OU-001.vmware.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730296AbeISDFF (ORCPT ); Tue, 18 Sep 2018 23:05:05 -0400 Received: from sc9-mailhost2.vmware.com (10.113.161.72) by EX13-EDG-OU-001.vmware.com (10.113.208.155) with Microsoft SMTP Server id 15.0.1156.6; Tue, 18 Sep 2018 14:30:32 -0700 Received: from sc2-haas01-esx0118.eng.vmware.com (sc2-haas01-esx0118.eng.vmware.com [10.172.44.118]) by sc9-mailhost2.vmware.com (Postfix) with ESMTP id 9AC03B0C0E; Tue, 18 Sep 2018 17:30:35 -0400 (EDT) From: Nadav Amit To: Ingo Molnar CC: , , Nadav Amit , Thomas Gleixner , "H. Peter Anvin" , Josh Poimboeuf Subject: [PATCH v8 05/10] x86: alternatives: macrofy locks for better inlining Date: Tue, 18 Sep 2018 14:28:42 -0700 Message-ID: <20180918212847.199085-6-namit@vmware.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180918212847.199085-1-namit@vmware.com> References: <20180918212847.199085-1-namit@vmware.com> MIME-Version: 1.0 Content-Type: text/plain Received-SPF: None (EX13-EDG-OU-001.vmware.com: namit@vmware.com does not designate permitted sender hosts) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org GCC considers the number of statements in inlined assembly blocks, according to new-lines and semicolons, as an indication to the cost of the block in time and space. This data is distorted by the kernel code, which puts information in alternative sections. As a result, the compiler may perform incorrect inlining and branch optimizations. The solution is to set an assembly macro and call it from the inlined assembly block. As a result GCC considers the inline assembly block as a single instruction. This patch handles the LOCK prefix, allowing more aggresive inlining. text data bss dec hex filename 18140140 10225284 2957312 31322736 1ddf270 ./vmlinux before 18146889 10225380 2957312 31329581 1de0d2d ./vmlinux after (+6845) Static text symbols: Before: 40286 After: 40218 (-68) Cc: Thomas Gleixner Cc: Ingo Molnar Cc: "H. Peter Anvin" Cc: x86@kernel.org Cc: Josh Poimboeuf Acked-by: Peter Zijlstra (Intel) Signed-off-by: Nadav Amit --- arch/x86/include/asm/alternative-asm.h | 20 ++++++++++++++------ arch/x86/include/asm/alternative.h | 11 ++--------- arch/x86/kernel/macros.S | 1 + 3 files changed, 17 insertions(+), 15 deletions(-) diff --git a/arch/x86/include/asm/alternative-asm.h b/arch/x86/include/asm/alternative-asm.h index 31b627b43a8e..8e4ea39e55d0 100644 --- a/arch/x86/include/asm/alternative-asm.h +++ b/arch/x86/include/asm/alternative-asm.h @@ -7,16 +7,24 @@ #include #ifdef CONFIG_SMP - .macro LOCK_PREFIX -672: lock +.macro LOCK_PREFIX_HERE .pushsection .smp_locks,"a" .balign 4 - .long 672b - . + .long 671f - . # offset .popsection - .endm +671: +.endm + +.macro LOCK_PREFIX insn:vararg + LOCK_PREFIX_HERE + lock \insn +.endm #else - .macro LOCK_PREFIX - .endm +.macro LOCK_PREFIX_HERE +.endm + +.macro LOCK_PREFIX insn:vararg +.endm #endif /* diff --git a/arch/x86/include/asm/alternative.h b/arch/x86/include/asm/alternative.h index 4cd6a3b71824..d7faa16622d8 100644 --- a/arch/x86/include/asm/alternative.h +++ b/arch/x86/include/asm/alternative.h @@ -31,15 +31,8 @@ */ #ifdef CONFIG_SMP -#define LOCK_PREFIX_HERE \ - ".pushsection .smp_locks,\"a\"\n" \ - ".balign 4\n" \ - ".long 671f - .\n" /* offset */ \ - ".popsection\n" \ - "671:" - -#define LOCK_PREFIX LOCK_PREFIX_HERE "\n\tlock; " - +#define LOCK_PREFIX_HERE "LOCK_PREFIX_HERE\n\t" +#define LOCK_PREFIX "LOCK_PREFIX " #else /* ! CONFIG_SMP */ #define LOCK_PREFIX_HERE "" #define LOCK_PREFIX "" diff --git a/arch/x86/kernel/macros.S b/arch/x86/kernel/macros.S index f1fe1d570365..852487a9fc56 100644 --- a/arch/x86/kernel/macros.S +++ b/arch/x86/kernel/macros.S @@ -8,3 +8,4 @@ #include #include +#include -- 2.17.1