From: Vladimir Makarov <vmakarov@redhat.com>
To: Jakub Jelinek <jakub@redhat.com>
Cc: Christophe Lyon <christophe.lyon.oss@gmail.com>,
"gcc-patches@gcc.gnu.org" <gcc-patches@gcc.gnu.org>
Subject: Re: [PR103437] [committed] IRA: Process multiplication overflow in priority calculation for allocno assignments
Date: Thu, 2 Dec 2021 12:21:08 -0500 [thread overview]
Message-ID: <6995f136-f658-2f81-47e7-c869cd1b554b@redhat.com> (raw)
In-Reply-To: <dbbd19f9-9e8a-5316-dc7c-e263e627a0e3@redhat.com>
On 2021-12-02 12:06, Vladimir Makarov wrote:
>
> On 2021-12-02 11:13, Jakub Jelinek wrote:
>> On Thu, Dec 02, 2021 at 11:03:46AM -0500, Vladimir Makarov wrote:
>>> --- a/gcc/ira-color.c
>>> +++ b/gcc/ira-color.c
>>> @@ -2797,6 +2797,7 @@ static void
>>> setup_allocno_priorities (ira_allocno_t *consideration_allocnos,
>>> int n)
>>> {
>>> int i, length, nrefs, priority, max_priority, mult, diff;
>>> + bool overflow_backup_p = true;
>>> ira_allocno_t a;
>>> max_priority = 0;
>>> @@ -2811,9 +2812,25 @@ setup_allocno_priorities (ira_allocno_t
>>> *consideration_allocnos, int n)
>>> diff = ALLOCNO_MEMORY_COST (a) - ALLOCNO_CLASS_COST (a);
>>> /* Multiplication can overflow for very large functions.
>>> Check the overflow and constrain the result if necessary: */
>>> +#ifdef __has_builtin
>>> +#if __has_builtin(__builtin_smul_overflow)
>>> + overflow_backup_p = false;
>>> if (__builtin_smul_overflow (mult, diff, &priority)
>>> || priority <= -INT_MAX)
>>> priority = diff >= 0 ? INT_MAX : -INT_MAX;
>>> +#endif
>>> +#endif
>>> + if (overflow_backup_p)
>>> + {
>>> + static_assert
>>> + (sizeof (long long) >= 2 * sizeof (int),
>>> + "overflow code does not work for such int and long long
>>> sizes");
>>> + long long priorityll = (long long) mult * diff;
>>> + if (priorityll < -INT_MAX || priorityll > INT_MAX)
>>> + priority = diff >= 0 ? INT_MAX : -INT_MAX;
>>> + else
>>> + priority = priorityll;
>>> + }
> So simple problem and so many details :)
>> This will require that long long is at least twice as large as int
>> everywhere, I thought you wanted to do that only when
>> __builtin_smul_overflow isn't available.
>
> That is not critical as GCC and probably all others C++ compiler
> support only targets with this assertion. I guess it is better to
> find this problem earlier on targets (if any) where it is not true
> *independently* on used compiler.
>
> So it is difficult for me to know what is better. Probably for
> GCC/Clang oriented world, your variant is better as it permits to
> compile the code by GCC even on targets where the assertion is false.
>
>
After some more considerations, I think you are right and the backup
code should be conditional. Because otherwise, there is no sense to use
code with __builtin_smul_overflow. I'll do the changes.
next prev parent reply other threads:[~2021-12-02 17:21 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-12-02 13:53 Vladimir Makarov
2021-12-02 14:00 ` Jakub Jelinek
2021-12-02 14:23 ` Vladimir Makarov
2021-12-02 14:29 ` Jakub Jelinek
2021-12-02 14:38 ` Vladimir Makarov
2021-12-02 15:52 ` Christophe Lyon
2021-12-02 16:03 ` Vladimir Makarov
2021-12-02 16:13 ` Jakub Jelinek
2021-12-02 17:06 ` Vladimir Makarov
2021-12-02 17:21 ` Vladimir Makarov [this message]
2021-12-02 17:44 ` Vladimir Makarov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=6995f136-f658-2f81-47e7-c869cd1b554b@redhat.com \
--to=vmakarov@redhat.com \
--cc=christophe.lyon.oss@gmail.com \
--cc=gcc-patches@gcc.gnu.org \
--cc=jakub@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).