[PATCH] capabilities: use logical OR

Min-Hua Chen minhuadotchen at gmail.com
Wed May 31 19:32:31 UTC 2023


>From: Min-Hua Chen <minhuadotchen at gmail.com>
>> Sent: 29 May 2023 23:55
>> 
>> Use logical OR to fix the following sparse warnings:
>> 
>> security/commoncap.c:1358:41: sparse: warning: dubious: !x | y
>> 
>> No functional changes intended.
>
>Except it will run just that teeny, weeny bit slower.
>
>	David
>

Thanks for the comment.

I wrote a test case on my x86 machine to see the difference
between '|' and '||' versions.

The '|' version does 2 OR operations and 1 test. (all cases)
The '||' (logical or) version does 3 cmpl (worst case)
and 1 cmpl and 1 jump if the first argument is TRUE (best case).

For the readers, I think the logical OR version is clearer.


thanks,
Min-Hua

my test case:

void foo(void)
{
}

void bar(void)
{
}

int main(void)
{
	int a, b, c;
	if (a || b || c) 
		foo();
	else
		bar();
}

if (a || b || c) 
logical OR
Dump of assembler code for function main:
0x000000000000113f <+0>:     endbr64
0x0000000000001143 <+4>:     push   %rbp
0x0000000000001144 <+5>:     mov    %rsp,%rbp
0x0000000000001147 <+8>:     sub    $0x10,%rsp
0x000000000000114b <+12>:    cmpl   $0x0,-0xc(%rbp)
0x000000000000114f <+16>:    jne    0x115d <main+30>
0x0000000000001151 <+18>:    cmpl   $0x0,-0x8(%rbp)
0x0000000000001155 <+22>:    jne    0x115d <main+30>
0x0000000000001157 <+24>:    cmpl   $0x0,-0x4(%rbp)
0x000000000000115b <+28>:    je     0x1164 <main+37>
0x000000000000115d <+30>:    call   0x1129 <foo>
0x0000000000001162 <+35>:    jmp    0x1169 <main+42>
0x0000000000001164 <+37>:    call   0x1134 <bar>
0x0000000000001169 <+42>:    mov    $0x0,%eax
0x000000000000116e <+47>:    leave
0x000000000000116f <+48>:    ret
End of assembler dump.

if (a | b | c)
Dump of assembler code for function main:
0x000000000000113f <+0>:     endbr64
0x0000000000001143 <+4>:     push   %rbp
0x0000000000001144 <+5>:     mov    %rsp,%rbp
0x0000000000001147 <+8>:     sub    $0x10,%rsp
0x000000000000114b <+12>:    mov    -0xc(%rbp),%eax
0x000000000000114e <+15>:    or     -0x8(%rbp),%eax
0x0000000000001151 <+18>:    or     -0x4(%rbp),%eax
0x0000000000001154 <+21>:    test   %eax,%eax
0x0000000000001156 <+23>:    je     0x115f <main+32>
0x0000000000001158 <+25>:    call   0x1129 <foo>
0x000000000000115d <+30>:    jmp    0x1164 <main+37>
0x000000000000115f <+32>:    call   0x1134 <bar>
0x0000000000001164 <+37>:    mov    $0x0,%eax
0x0000000000001169 <+42>:    leave
0x000000000000116a <+43>:    ret
End of assembler dump.



More information about the Linux-security-module-archive mailing list