From: Andrew Morton <akpm@linux-foundation.org>
To: Nathan Chancellor <nathan@kernel.org>
Cc: willy@infradead.org, ndesaulniers@google.com,
linux-fsdevel@vger.kernel.org, llvm@lists.linux.dev,
patches@lists.linux.dev,
Naresh Kamboju <naresh.kamboju@linaro.org>
Subject: Re: [PATCH] buffer: Add cast in grow_buffers() to avoid a multiplication libcall
Date: Tue, 28 Nov 2023 17:40:24 -0800 [thread overview]
Message-ID: <20231128174024.a74bfa551718082ca8808a98@linux-foundation.org> (raw)
In-Reply-To: <20231128-avoid-muloti4-grow_buffers-v1-1-bc3d0f0ec483@kernel.org>
On Tue, 28 Nov 2023 16:55:43 -0700 Nathan Chancellor <nathan@kernel.org> wrote:
> When building with clang after commit 697607935295 ("buffer: fix
> grow_buffers() for block size > PAGE_SIZE"), there is an error at link
> time due to the generation of a 128-bit multiplication libcall:
>
> ld.lld: error: undefined symbol: __muloti4
> >>> referenced by buffer.c:0 (fs/buffer.c:0)
> >>> fs/buffer.o:(bdev_getblk) in archive vmlinux.a
>
> Due to the width mismatch between the factors and the sign mismatch
> between the factors and the result, clang generates IR that performs
> this overflow check with 65-bit signed multiplication and LLVM does not
> improve on it during optimization, so the 65-bit multiplication is
> extended to 128-bit during legalization, resulting in the libcall on
> most targets.
>
> To avoid the initial situation that causes clang to generate the
> problematic IR, cast size (which is an 'unsigned int') to the same
> type/width as block (which is currently a 'u64'/'unsigned long long').
> GCC appears to already do this internally because there is no binary
> difference with the cast for arm, arm64, riscv, or x86_64.
>
> ...
>
> I am aware the hash in the commit message is not stable due to being on
> the mm-unstable branch but I figured I would write the commit message as
> if it would be standalone, in case this should not be squashed into the
> original change. I did not add a comment to the source around this
> workaround but I can if so desired.
That's good. Yes, I'll squash it into the base patch, but the Link: to
this fix will appear in the permanent record, for the inquisitive.
> --- a/fs/buffer.c
> +++ b/fs/buffer.c
> @@ -1091,7 +1091,7 @@ static bool grow_buffers(struct block_device *bdev, sector_t block,
> * Check for a block which lies outside our maximum possible
> * pagecache index.
> */
> - if (check_mul_overflow(block, size, &pos) || pos > MAX_LFS_FILESIZE) {
> + if (check_mul_overflow(block, (sector_t)size, &pos) || pos > MAX_LFS_FILESIZE) {
> printk(KERN_ERR "%s: requested out-of-range block %llu for device %pg\n",
> __func__, (unsigned long long)block,
> bdev);
This seems appropriate. Changing the type of incoming arg `size' feels
a bit fake - this is the per-bdev buffer_head size and expressing that
as a sector_t is misleading and unrealistic.
prev parent reply other threads:[~2023-11-29 1:40 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-11-28 23:55 [PATCH] buffer: Add cast in grow_buffers() to avoid a multiplication libcall Nathan Chancellor
2023-11-29 1:40 ` Andrew Morton [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20231128174024.a74bfa551718082ca8808a98@linux-foundation.org \
--to=akpm@linux-foundation.org \
--cc=linux-fsdevel@vger.kernel.org \
--cc=llvm@lists.linux.dev \
--cc=naresh.kamboju@linaro.org \
--cc=nathan@kernel.org \
--cc=ndesaulniers@google.com \
--cc=patches@lists.linux.dev \
--cc=willy@infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox