From: Segher Boessenkool <segher@kernel.crashing.org>
To: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Bill Wendling <morbo@google.com>,
Nick Desaulniers <ndesaulniers@google.com>,
"H. Peter Anvin" <hpa@zytor.com>,
Thomas Gleixner <tglx@linutronix.de>,
Ingo Molnar <mingo@redhat.com>, Borislav Petkov <bp@alien8.de>,
Dave Hansen <dave.hansen@linux.intel.com>,
"maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)"
<x86@kernel.org>, Nathan Chancellor <nathan@kernel.org>,
Juergen Gross <jgross@suse.com>,
Peter Zijlstra <peterz@infradead.org>,
Andy Lutomirski <luto@kernel.org>,
llvm@lists.linux.dev, LKML <linux-kernel@vger.kernel.org>,
linux-toolchains <linux-toolchains@vger.kernel.org>
Subject: Re: [PATCH v5] x86: use builtins to read eflags
Date: Thu, 17 Mar 2022 19:05:40 -0500 [thread overview]
Message-ID: <20220318000540.GO614@gate.crashing.org> (raw)
In-Reply-To: <CAHk-=wgHgSJ-suTT6V6_2USPDrdmQweLR_M_YHjb8OsQvYWn-w@mail.gmail.com>
On Thu, Mar 17, 2022 at 04:31:19PM -0700, Linus Torvalds wrote:
> On Thu, Mar 17, 2022 at 4:25 PM Segher Boessenkool
> <segher@kernel.crashing.org> wrote:
> >
> > > I still think that from a sanity standpoint, it would be good to
> > > actually strengthen the semantics of "asm volatile" to literally act
> > > as - and be ordered with - volatile memory accesses.
> > >
> > > But I guess that's water under the bridge.
> >
> > That is what it has actually done since forever. See C 5.1.2.3. For
> > GCC, "asm volatile" has a side effect like in /2 there as well, as does
> > unspec_volatile (an internal GCC thing used to implement certain
> > builtins, among other things).
>
> Oh, so two "asm volatile" statements _are_ in fact defined to be
> ordered wrt each other?
Colloquially you could say that. But that statement can be understood
to mean more than the actual guarantee (and it is also much less than
it, oin the positive side).
> Because the gcc docs certainly don't say that ;(
Older GCC docs said
You will also want to add the volatile keyword if the memory affected
is not listed in the inputs or outputs of the asm, as the `memory'
clobber does not count as a side-effect of the asm.
and
The volatile keyword indicates that the instruction has important
side-effects. GCC will not delete a volatile asm if it is reachable.
(The instruction can still be deleted if GCC can prove that
control-flow will never reach the location of the instruction.) Note
that even a volatile asm instruction can be moved relative to other
code, including across jump instructions.
and
Similarly, you can't expect a sequence of volatile asm instructions to
remain perfectly consecutive. If you want consecutive output, use a
single asm. Also, GCC will perform some optimizations across a
volatile asm instruction; GCC does not “forget everything” when it
encounters a volatile asm instruction the way some other compilers do.
The internal assembler docs were rewritten later, because they were
considered too terse, too hard for users to understand. But they may
have lost some clarity in the process.
> Yeah, yeah, dead code can be removed, whether volatile or not. That's
> true of "*(volatile int *)x" too. It's not the dead code that is the
> interesting case, though..
Internally to GCC this is the same in most ways, too; it's no accident
this things correspond so well :-)
> Is this also well-defined ordering-wise:
>
> asm volatile("do_something");
> WRITE_ONCE(x, 1);
>
> (where "WRITE_ONCE()" is that kernel macro that just uses a volatile
> pointer assignment to force the access)?
The macro in asm-generic is
#define __WRITE_ONCE(x, val) \
do { \
*(volatile typeof(x) *)&(x) = (val); \
} while (0)
which will work fine given the undocumented C extension I mentioned in
https://gcc.gnu.org/PR33053 (this will be part of C2x as well btw).
I don't know if all arch-specific versions are fine.
> And could we get that documented?
Could you open a GCC PR for it? I can do it, but you know better what
you want, and I might forget, etc.
Segher
next prev parent reply other threads:[~2022-03-18 0:11 UTC|newest]
Thread overview: 68+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-12-15 21:18 [PATCH] x86: use builtins to read eflags Bill Wendling
2021-12-15 22:46 ` Nathan Chancellor
2021-12-15 23:26 ` Peter Zijlstra
2021-12-16 20:00 ` Bill Wendling
2021-12-16 20:07 ` Nick Desaulniers
2021-12-16 0:57 ` Thomas Gleixner
2021-12-16 19:55 ` Bill Wendling
2021-12-17 12:48 ` Peter Zijlstra
2021-12-17 19:39 ` Thomas Gleixner
2022-03-14 23:09 ` H. Peter Anvin
2022-03-15 0:08 ` Bill Wendling
2021-12-16 19:58 ` Nick Desaulniers
2021-12-29 2:12 ` [PATCH v2] " Bill Wendling
2022-01-27 20:56 ` Bill Wendling
2022-02-04 0:16 ` Thomas Gleixner
2022-02-04 0:58 ` Bill Wendling
2022-02-04 0:57 ` [PATCH v3] " Bill Wendling
2022-02-07 22:11 ` Nick Desaulniers
2022-02-08 9:14 ` David Laight
2022-02-08 23:18 ` Bill Wendling
2022-02-14 23:53 ` Nick Desaulniers
2022-02-10 22:31 ` [PATCH v4] " Bill Wendling
2022-02-11 16:40 ` David Laight
2022-02-11 19:25 ` Bill Wendling
2022-02-11 22:09 ` David Laight
2022-02-11 23:33 ` Bill Wendling
2022-02-12 0:24 ` Nick Desaulniers
2022-02-12 9:23 ` Bill Wendling
2022-02-15 0:33 ` Nick Desaulniers
2022-03-01 20:19 ` [PATCH v5] " Bill Wendling
2022-03-14 23:07 ` Bill Wendling
[not found] ` <AC3D873E-A28B-41F1-8BF4-2F6F37BCEEB4@zytor.com>
2022-03-15 7:19 ` Bill Wendling
2022-03-17 15:43 ` H. Peter Anvin
2022-03-17 18:00 ` Nick Desaulniers
2022-03-17 18:52 ` Linus Torvalds
2022-03-17 19:45 ` Bill Wendling
2022-03-17 20:13 ` Linus Torvalds
2022-03-17 21:10 ` Bill Wendling
2022-03-17 21:21 ` Linus Torvalds
2022-03-17 21:45 ` Bill Wendling
2022-03-17 22:51 ` Linus Torvalds
2022-03-17 23:14 ` Linus Torvalds
2022-03-17 23:19 ` Segher Boessenkool
2022-03-17 23:31 ` Linus Torvalds
2022-03-18 0:05 ` Segher Boessenkool [this message]
2022-03-17 22:37 ` Segher Boessenkool
2022-03-17 20:13 ` Florian Weimer
2022-03-17 20:36 ` Linus Torvalds
2022-03-18 0:25 ` Segher Boessenkool
2022-03-18 1:21 ` Linus Torvalds
2022-03-18 1:50 ` Linus Torvalds
2022-03-17 21:05 ` Andrew Cooper
2022-03-17 21:39 ` Linus Torvalds
2022-03-18 17:59 ` Andy Lutomirski
2022-03-18 18:19 ` Linus Torvalds
2022-03-18 21:48 ` Andrew Cooper
2022-03-18 23:10 ` Linus Torvalds
2022-03-18 23:42 ` Segher Boessenkool
2022-03-19 1:13 ` Linus Torvalds
2022-03-19 23:15 ` Andy Lutomirski
2022-03-18 22:09 ` Segher Boessenkool
2022-03-18 22:33 ` H. Peter Anvin
2022-03-18 22:36 ` David Laight
2022-03-18 22:47 ` H. Peter Anvin
2022-03-18 22:43 ` David Laight
2022-03-18 23:03 ` H. Peter Anvin
2022-03-18 23:04 ` Segher Boessenkool
2022-03-18 23:52 ` David Laight
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20220318000540.GO614@gate.crashing.org \
--to=segher@kernel.crashing.org \
--cc=bp@alien8.de \
--cc=dave.hansen@linux.intel.com \
--cc=hpa@zytor.com \
--cc=jgross@suse.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-toolchains@vger.kernel.org \
--cc=llvm@lists.linux.dev \
--cc=luto@kernel.org \
--cc=mingo@redhat.com \
--cc=morbo@google.com \
--cc=nathan@kernel.org \
--cc=ndesaulniers@google.com \
--cc=peterz@infradead.org \
--cc=tglx@linutronix.de \
--cc=torvalds@linux-foundation.org \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.