[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20130423.133732.2222922370397287096.davem@davemloft.net>
Date: Tue, 23 Apr 2013 13:37:32 -0400 (EDT)
From: David Miller <davem@...emloft.net>
To: torvalds@...ux-foundation.org
Cc: David.Laight@...lab.com, mingo@...nel.org, hpa@...or.com,
tglx@...utronix.de, tytso@....edu, linux-kernel@...r.kernel.org,
x86@...nel.org, netdev@...r.kernel.org, linux-ext4@...r.kernel.org
Subject: Re: Unsigned widening casts of binary "not" operations..
From: Linus Torvalds <torvalds@...ux-foundation.org>
Date: Tue, 23 Apr 2013 08:42:49 -0700
> An explicit cast fixes it, and shows that you were aware of the issue:
>
> foo &= ~(foo_t)bar;
>
> and gcc will generate the right logic. Of course, casts then have
> their own problems, which your thing avoids (as would just having a
> "andn" operation in C)
I just want to mention that this is dangerous in different ways, we
just recently got a patch in the networking that removed such a cast.
The problem is when the cast narrows, f.e.:
~(u8)0
doesn't do what you think it does. That doesn't evaluate to 0xff.
You all are very bright and probably know this already.
So,if it widens, which is the situation we're talking about, you're
good. But until I saw the above u8 thing I never suspected that
narrowing in this kind of expression was dangerous.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists