Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3452698pxj; Mon, 7 Jun 2021 10:58:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwjANMelRD354qZnWHFlI04djjV35ap7gUEIOsh2RoyjTeQkkD+kSLewHK0R/jF8qe6Xs2c X-Received: by 2002:a17:906:d0da:: with SMTP id bq26mr19721770ejb.287.1623088697202; Mon, 07 Jun 2021 10:58:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623088697; cv=none; d=google.com; s=arc-20160816; b=P+NWvNYX5kcyud3RvRa7YKVyBnwGGrua2UUWhudrTTV+xYZeWljB9uKo+WJ+kLcRqH 77EIsOHQQx1aYQ4KsQ8fTPcFF/eZ9RfEwBcyj/wxN5pKLNqDYmNAL9lTyQF4mItCqTvz 09PRJIEgdsClyG+nFbmyUH9eAM3UBpAKGohCK7sh15ezDcIxrrPRbQTok7+e3uIaV6sx YlUwSt4EtL7uiFnbZZlnanrN03dxk8CNef5Vidr7u4HC3FHFJzwQHtnzL+Z15X/hRQcb +z8RG706n0jvg47iudvx1IqdGb7P0EAdL/58LYDMbJhA8BwDPAzePJh/+LM1/qlRSb+5 GL1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=x2k2VBR1g71olv41Z2grTM80VZF+ga22Cc+D4InP0Gg=; b=C5cmLXhPBsgEC8BrPZoC6dKdM5LroVYHpPMGjzTb4I52K73fic+dShmGor6YUYEnjc KxNs8e6CQ11f6A9aGQASrHTFhW+sz7q7dAUR+ZsVvnbzOVxn1G5t9wnbRy0hxojWXToF fv5JVp31apBsbZ78bYSJ9hddtk/jnKGAZlriCRZ7HXrNidaY9NlqA44gE0c10q3wO4P8 tYbAIzE+e93MrHvtVdy2fZT1tInkAzQSCEgC7vVITUTzEV+5/7oh9klLzuUHVK9Xudt2 222BFKuDoN6MHJ6YGW4X3A9/GnvYhrwZ6KP9dSR9DjND/9iwwb6lGkmgQaOBLjaZPIBF iPEg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n15si12838292ejl.587.2021.06.07.10.57.44; Mon, 07 Jun 2021 10:58:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230434AbhFGR6N (ORCPT + 99 others); Mon, 7 Jun 2021 13:58:13 -0400 Received: from gate.crashing.org ([63.228.1.57]:37131 "EHLO gate.crashing.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230291AbhFGR6M (ORCPT ); Mon, 7 Jun 2021 13:58:12 -0400 Received: from gate.crashing.org (localhost.localdomain [127.0.0.1]) by gate.crashing.org (8.14.1/8.14.1) with ESMTP id 157Hq28m015783; Mon, 7 Jun 2021 12:52:02 -0500 Received: (from segher@localhost) by gate.crashing.org (8.14.1/8.14.1/Submit) id 157Hq13C015762; Mon, 7 Jun 2021 12:52:01 -0500 X-Authentication-Warning: gate.crashing.org: segher set sender to segher@kernel.crashing.org using -f Date: Mon, 7 Jun 2021 12:52:00 -0500 From: Segher Boessenkool To: Alexander Monakov Cc: Linus Torvalds , Jakub Jelinek , Alan Stern , "Paul E. McKenney" , Peter Zijlstra , Will Deacon , Andrea Parri , Boqun Feng , Nick Piggin , David Howells , Jade Alglave , Luc Maranget , Akira Yokosawa , Linux Kernel Mailing List , linux-toolchains@vger.kernel.org, linux-arch Subject: Re: [RFC] LKMM: Add volatile_if() Message-ID: <20210607175200.GG18427@gate.crashing.org> References: <20210605145739.GB1712909@rowland.harvard.edu> <20210606001418.GH4397@paulmck-ThinkPad-P17-Gen-1> <20210606012903.GA1723421@rowland.harvard.edu> <20210606185922.GF7746@tucnak> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.4.2.3i Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 07, 2021 at 11:01:39AM +0300, Alexander Monakov wrote: > Uhh... I was not talking about some (non-existent) "optimizing linker". > LTO works by relaunching the compiler from the linker and letting it > consume multiple translation units (which are fully preprocessed by that > point). So the very thing you wanted to avoid -- such barriers appearing > in close proximity where they can be deduplicated -- may arise after a > little bit of cross-unit inlining. > > My main point here is that using __COUNTER__ that way (making things > "unique" for the compiler) does not work in general when LTO enters the > picture. As long as that is remembered, I'm happy. Yup. Exactly the same issue as using this in any function that may end up inlined. > > In the case of "volatile_if()", we actually would like to have not a > > memory clobber, but a "memory read". IOW, it would be a barrier for > > any writes taking place, but reads can move around it. > > > > I don't know of any way to express that to the compiler. We've used > > hacks for it before (in gcc, BLKmode reads turn into that kind of > > barrier in practice, so you can do something like make the memory > > input to the asm be a big array). But that turned out to be fairly > > unreliable, so now we use memory clobbers even if we just mean "reads > > random memory". > > So the barrier which is a compiler barrier but not a machine barrier is > __atomic_signal_fence(model), but internally GCC will not treat it smarter > than an asm-with-memory-clobber today. It will do nothing for relaxed ordering, and do blockage for everything else. Can it do anything weaker than that? Segher