Numbers of it didn't happen.

On Mon, Nov 30, 2015 at 9:49 PM, 'Davide Libenzi' via Akaros <
[email protected]> wrote:

> The MUL_NO_OVERFLOW thing makes little sense in the CPUs we are targeting.
> A couple of mis-predicted branches are more expensive than a DIV (~20
> cycles in today Intel).
> Much faster:
>
> typedef unsigned __int128 uint128_t;
>
> {
>      uint128_t n = (uint128_t) nmemb * (uint128_t) size;
>
>     if (n > SIZE_MAX) foo();
>
> }
>
>
> --------------------
> typedef unsigned __int128 u128;
>
> static const unsigned long ulmax = ~0UL;
>
> unsigned long oc(unsigned long a, unsigned long b)
> {
>     u128 m = (u128) a * (u128) b;
>
>     if (m > ulmax)
>         m = 0;
>
>     return (unsigned long) m;
> }
>
> ----
> oc:
>     movq    %rdi, %rax
>     mulq    %rsi
>     movq    %rax, %r9
>     xorl    %eax, %eax
>     testq   %rdx, %rdx
>     cmove   %r9, %rax
>     ret
>
>
>
>
>
>
>
> On Mon, Nov 30, 2015 at 1:18 PM, Barret Rhoden <[email protected]>
> wrote:
>
>> One thing to be careful of is that these functions can fail and return 0,
>> regardless of your kmalloc flags.
>>
>> Signed-off-by: Barret Rhoden <[email protected]>
>> ---
>>  kern/include/kmalloc.h   | 5 +++--
>>  kern/src/kreallocarray.c | 9 +++++++++
>>  2 files changed, 12 insertions(+), 2 deletions(-)
>>
>> diff --git a/kern/include/kmalloc.h b/kern/include/kmalloc.h
>> index 268cf2985ddb..26f23c1754c0 100644
>> --- a/kern/include/kmalloc.h
>> +++ b/kern/include/kmalloc.h
>> @@ -16,8 +16,9 @@
>>  #define KMALLOC_LARGEST KMALLOC_SMALLEST << NUM_KMALLOC_CACHES
>>
>>  void kmalloc_init(void);
>> -void* kmalloc(size_t size, int flags);
>> -void* kzmalloc(size_t size, int flags);
>> +void *kmalloc(size_t size, int flags);
>> +void *kmalloc_array(size_t nmemb, size_t size, int flags);
>> +void *kzmalloc(size_t size, int flags);
>>  void *kmalloc_align(size_t size, int flags, size_t align);
>>  void *kzmalloc_align(size_t size, int flags, size_t align);
>>  void *krealloc(void *buf, size_t size, int flags);
>> diff --git a/kern/src/kreallocarray.c b/kern/src/kreallocarray.c
>> index d099721e0406..505159917317 100644
>> --- a/kern/src/kreallocarray.c
>> +++ b/kern/src/kreallocarray.c
>> @@ -34,3 +34,12 @@ void *kreallocarray(void *optr, size_t nmemb, size_t
>> size, int flags)
>>         }
>>         return krealloc(optr, size * nmemb, flags);
>>  }
>> +
>> +void *kmalloc_array(size_t nmemb, size_t size, int flags)
>> +{
>> +       if (((nmemb >= MUL_NO_OVERFLOW) || (size >= MUL_NO_OVERFLOW)) &&
>> +           (nmemb > 0) && ((SIZE_MAX / nmemb) < size)) {
>> +               return NULL;
>> +       }
>> +       return kmalloc(size * nmemb, flags);
>> +}
>> --
>> 2.6.0.rc2.230.g3dd15c0
>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "Akaros" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to [email protected].
>> To post to this group, send email to [email protected].
>> For more options, visit https://groups.google.com/d/optout.
>>
>
> --
> You received this message because you are subscribed to the Google Groups
> "Akaros" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To post to this group, send email to [email protected].
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"Akaros" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to