diff options
-rw-r--r-- | include/linux/compiler.h | 21 |
1 files changed, 16 insertions, 5 deletions
diff --git a/include/linux/compiler.h b/include/linux/compiler.h index a1c81f80978e..5e186bf6f6c1 100644 --- a/include/linux/compiler.h +++ b/include/linux/compiler.h | |||
@@ -447,12 +447,23 @@ static __always_inline void __assign_once_size(volatile void *p, void *res, int | |||
447 | * to make the compiler aware of ordering is to put the two invocations of | 447 | * to make the compiler aware of ordering is to put the two invocations of |
448 | * ACCESS_ONCE() in different C statements. | 448 | * ACCESS_ONCE() in different C statements. |
449 | * | 449 | * |
450 | * This macro does absolutely -nothing- to prevent the CPU from reordering, | 450 | * ACCESS_ONCE will only work on scalar types. For union types, ACCESS_ONCE |
451 | * merging, or refetching absolutely anything at any time. Its main intended | 451 | * on a union member will work as long as the size of the member matches the |
452 | * use is to mediate communication between process-level code and irq/NMI | 452 | * size of the union and the size is smaller than word size. |
453 | * handlers, all running on the same CPU. | 453 | * |
454 | * The major use cases of ACCESS_ONCE used to be (1) Mediating communication | ||
455 | * between process-level code and irq/NMI handlers, all running on the same CPU, | ||
456 | * and (2) Ensuring that the compiler does not fold, spindle, or otherwise | ||
457 | * mutilate accesses that either do not require ordering or that interact | ||
458 | * with an explicit memory barrier or atomic instruction that provides the | ||
459 | * required ordering. | ||
460 | * | ||
461 | * If possible use READ_ONCE/ASSIGN_ONCE instead. | ||
454 | */ | 462 | */ |
455 | #define ACCESS_ONCE(x) (*(volatile typeof(x) *)&(x)) | 463 | #define __ACCESS_ONCE(x) ({ \ |
464 | __maybe_unused typeof(x) __var = 0; \ | ||
465 | (volatile typeof(x) *)&(x); }) | ||
466 | #define ACCESS_ONCE(x) (*__ACCESS_ONCE(x)) | ||
456 | 467 | ||
457 | /* Ignore/forbid kprobes attach on very low level functions marked by this attribute: */ | 468 | /* Ignore/forbid kprobes attach on very low level functions marked by this attribute: */ |
458 | #ifdef CONFIG_KPROBES | 469 | #ifdef CONFIG_KPROBES |