From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752080AbdC0G02 (ORCPT ); Mon, 27 Mar 2017 02:26:28 -0400 Received: from mail-wr0-f194.google.com ([209.85.128.194]:36453 "EHLO mail-wr0-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751578AbdC0G0T (ORCPT ); Mon, 27 Mar 2017 02:26:19 -0400 Date: Mon, 27 Mar 2017 08:25:54 +0200 From: Ingo Molnar To: Dmitry Vyukov Cc: akpm@linux-foundation.org, arnd@arndb.de, aryabinin@virtuozzo.com, Mark Rutland , Peter Zijlstra , Will Deacon , linux-mm@kvack.org, x86@kernel.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com Subject: Re: [PATCH v2] x86: s/READ_ONCE_NOCHECK/READ_ONCE/ in arch_atomic[64]_read() Message-ID: <20170327062554.GA10918@gmail.com> References: <20170322125740.85337-1-dvyukov@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170322125740.85337-1-dvyukov@google.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Dmitry Vyukov wrote: > Two problems was reported with READ_ONCE_NOCHECK in arch_atomic_read: > 1. Andrey Ryabinin reported significant binary size increase > (+400K of text). READ_ONCE_NOCHECK is intentionally compiled to > non-inlined function call, and I counted 640 copies of it in my vmlinux. > 2. Arnd Bergmann reported a new splat of too large frame sizes. > > A single inlined KASAN check is very cheap, a non-inlined function > call with KASAN/KCOV instrumentation can easily be more expensive. > > Switch to READ_ONCE() in arch_atomic[64]_read(). > > Signed-off-by: Dmitry Vyukov > Reported-by: Arnd Bergmann > Reported-by: Andrey Ryabinin > Cc: Mark Rutland > Cc: Peter Zijlstra > Cc: Will Deacon > Cc: Andrey Ryabinin > Cc: Andrew Morton > Cc: linux-mm@kvack.org > Cc: x86@kernel.org > Cc: linux-kernel@vger.kernel.org > Cc: kasan-dev@googlegroups.com > Signed-off-by: Dmitry Vyukov > > --- > > Changes since v1: > - also change arch_atomic64_read() > --- > arch/x86/include/asm/atomic.h | 15 ++++++--------- > arch/x86/include/asm/atomic64_64.h | 2 +- > 2 files changed, 7 insertions(+), 10 deletions(-) > > diff --git a/arch/x86/include/asm/atomic.h b/arch/x86/include/asm/atomic.h > index 0cde164f058a..46e53bbf7ce3 100644 > --- a/arch/x86/include/asm/atomic.h > +++ b/arch/x86/include/asm/atomic.h > @@ -24,10 +24,13 @@ > static __always_inline int arch_atomic_read(const atomic_t *v) > { > /* > - * We use READ_ONCE_NOCHECK() because atomic_read() contains KASAN > - * instrumentation. Double instrumentation is unnecessary. > + * Note: READ_ONCE() here leads to double instrumentation as > + * both READ_ONCE() and atomic_read() contain instrumentation. > + * This is deliberate choice. READ_ONCE_NOCHECK() is compiled to a > + * non-inlined function call that considerably increases binary size > + * and stack usage under KASAN. s/this is deliberate choice /this is a deliberate choice Also, the patch does not apply to the latest locking tree cleanly, due to interacting changes. Thanks, Ingo