Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp655126ybt; Wed, 1 Jul 2020 07:07:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzGGwvJUb/sq9BmGYO9HwROaD80Uni2vXUcK5XKF6UP6dV5v4DmAsiI0HfpnqiQpmw/bGUc X-Received: by 2002:a05:6402:337:: with SMTP id q23mr29945239edw.63.1593612466453; Wed, 01 Jul 2020 07:07:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593612466; cv=none; d=google.com; s=arc-20160816; b=Bnn9usOs+iohoC/hrI03z4fCzPyc0RNyoY8LSIurmewJfAg0zkPiQYgIRr8y6vFPLm 6gkbFMWRcXaiW0WUXYDSEuSCXP25LZK475dG3PXEKTZVTgqKvSUQv9ZquveMgqR6WvPn 7aMSQNWrd1AmeY11MsHMUhMdECqqTKtq9yxRMDskHVrkD7wTDcVeV3XfjLMnSrmhxfgN GgQuPKRRdBG1ioRR+Bw/nTIpReVLMnBY82/JdInaefO7HKVRnaKa6VlJNHDzmvVCNCG1 j6nxoO/nSW16SvfupX3wKAZc2Ol3xBSs4Qzw3kDf5Dx3SEBY6CK2uEQtzioNFjO7dl6m Pxvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=4x69qL1ReO15qt4obENpe9Ng4wK8gJ1u+pyFvdK76v0=; b=e9O1QNFvqBz4+UbZkRw4L3GMpk1+rWd85Hl2japnu276ovdpcgjDivXaJdc0jZpuUm B4TZ08ake18WSmZN1kV3GzQvi0YRBRMyGDziZMvjDZcMB19QILZr8JmApPoHLWhigDW+ aDfa9xB0qzfeJ7immO6YvYOO0f0WxIK+MPJNwpHjiH332afi/TvUE7+Ww/mSk5cIrdE5 Tu5HSWo1VbLwFn9dYr/6EVCeIM6GIQs+4SEMYgQyGiPAekE1CYHiMllLgTvNrdWqYk9W Z5BLCx3jh2UqxzLZ4d0I0qi0DddfOg4CGcYU2Z5Uw7B97YcK1h+6QZ0jA/ZXoDsVB34/ P2vA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=UxyMcT9U; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s20si3996009edy.519.2020.07.01.07.07.21; Wed, 01 Jul 2020 07:07:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=UxyMcT9U; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731287AbgGAOG4 (ORCPT + 99 others); Wed, 1 Jul 2020 10:06:56 -0400 Received: from mail.kernel.org ([198.145.29.99]:58518 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728021AbgGAOGz (ORCPT ); Wed, 1 Jul 2020 10:06:55 -0400 Received: from paulmck-ThinkPad-P72.home (50-39-105-78.bvtn.or.frontiernet.net [50.39.105.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3F0972068F; Wed, 1 Jul 2020 14:06:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593612414; bh=TCIa8yhQ4iVhyUzcOXhAGrgk0DX3phE5GMmWvDF0SV4=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=UxyMcT9UctCCaIS9T64uLEnTUJueiYzWguCdSzkmsvRznDtfDw6K50TsBnuGfQnvh fQWiMxyaoXsrygojoET/UKQpDuk/FJSnsGcZVVEcTHjQXT2Jk4t3WrtQh8qORfE1xt yJZwMhG0v2NygHMrb6PxDvizyK/jpOr1G9oTXgN4= Received: by paulmck-ThinkPad-P72.home (Postfix, from userid 1000) id 20A75352263F; Wed, 1 Jul 2020 07:06:54 -0700 (PDT) Date: Wed, 1 Jul 2020 07:06:54 -0700 From: "Paul E. McKenney" To: Peter Zijlstra Cc: Marco Elver , Nick Desaulniers , Sami Tolvanen , Masahiro Yamada , Will Deacon , Greg Kroah-Hartman , Kees Cook , clang-built-linux , Kernel Hardening , linux-arch , Linux ARM , Linux Kbuild mailing list , LKML , linux-pci@vger.kernel.org, "maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)" Subject: Re: [PATCH 00/22] add support for Clang LTO Message-ID: <20200701140654.GL9247@paulmck-ThinkPad-P72> Reply-To: paulmck@kernel.org References: <20200624211540.GS4817@hirez.programming.kicks-ass.net> <20200625080313.GY4817@hirez.programming.kicks-ass.net> <20200625082433.GC117543@hirez.programming.kicks-ass.net> <20200625085745.GD117543@hirez.programming.kicks-ass.net> <20200630191931.GA884155@elver.google.com> <20200630201243.GD4817@hirez.programming.kicks-ass.net> <20200630203016.GI9247@paulmck-ThinkPad-P72> <20200701114027.GO4800@hirez.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200701114027.GO4800@hirez.programming.kicks-ass.net> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jul 01, 2020 at 01:40:27PM +0200, Peter Zijlstra wrote: > On Wed, Jul 01, 2020 at 11:41:17AM +0200, Marco Elver wrote: > > On Tue, 30 Jun 2020 at 22:30, Paul E. McKenney wrote: > > > On Tue, Jun 30, 2020 at 10:12:43PM +0200, Peter Zijlstra wrote: > > > > On Tue, Jun 30, 2020 at 09:19:31PM +0200, Marco Elver wrote: > > > > > > Thoughts? > > > > > > > > How hard would it be to creates something that analyzes a build and > > > > looks for all 'dependent load -> control dependency' transformations > > > > headed by a volatile (and/or from asm) load and issues a warning for > > > > them? > > > > I was thinking about this, but in the context of the "auto-promote to > > acquire" which you didn't like. Issuing a warning should certainly be > > simpler. > > > > I think there is no one place where we know these transformations > > happen, but rather, need to analyze the IR before transformations, > > take note of all the dependent loads headed by volatile+asm, and then > > run an analysis after optimizations checking the dependencies are > > still there. > > Urgh, that sounds nasty. The thing is, as I've hinted at in my other > reply, I would really like a compiler switch to disable this > optimization entirely -- knowing how relevant the trnaformation is, is > simply a first step towards that. > > In order to control the tranformation, you have to actually know where > in the optimization passes it happens. > > Also, if (big if in my book) we find the optimization is actually > beneficial, we can invert the warning when using the switch and warn > about lost optimization possibilities and manually re-write the code to > use control deps. There are lots of optimization passes and any of them might decide to destroy dependencies. :-( > > > > This would give us an indication of how valuable this transformation is > > > > for the kernel. I'm hoping/expecting it's vanishingly rare, but what do > > > > I know. > > > > > > This could be quite useful! > > > > We might then even be able to say, "if you get this warning, turn on > > CONFIG_ACQUIRE_READ_DEPENDENCIES" (or however the option will be > > named). > > I was going to suggest: if this happens, employ -fno-wreck-dependencies > :-) The current state in the C++ committee is that marking variables carrying dependencies is the way forward. This is of course not what the Linux kernel community does, but it should not be hard to have a -fall-variables-dependent or some such that causes all variables to be treated as if they were marked. Though I was hoping for only pointers. Are they -sure- that they -absolutely- need to carry dependencies through integers??? Anyway, the next step is to provide this functionality in one of the major compilers. Akshat Garg started this in GCC as a GSoC project by duplicating "volatile" functionality with a _Dependent_ptr keyword. Next steps would include removing "volatile" functionality not required for dependencies. Here is a random posting, which if I remember correctly raised some doubts as to whether "volatile" was really carried through everywhere that it needs to for things like LTO: https://gcc.gnu.org/legacy-ml/gcc/2019-07/msg00139.html What happened to this effort? Akshat graduated and got an unrelated job, you know, the usual. ;-) Thanx, Paul