Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp5508257rwd; Mon, 5 Jun 2023 04:55:33 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7403LWzAAUg06G7CYK/iPP3+R6OEvxwPh0OR09Xp+KabSBv2SIEEcSXB8Hm0rOTgqUJa7J X-Received: by 2002:a05:6a20:72a3:b0:10c:3535:162f with SMTP id o35-20020a056a2072a300b0010c3535162fmr8225250pzk.0.1685966133257; Mon, 05 Jun 2023 04:55:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685966133; cv=none; d=google.com; s=arc-20160816; b=hPAiRvwHXbXviyzvFFXRsV7cXo/opIlNwakaEn83ECxR8+qiA+dnTR+zAyvX16PYh7 vKtDO0hhjLMezKh+W7ancd91YJFXVqLdQH0ZS6RxTe69V23R7qVLyGvYvGd5e8CTryHj n88CcMpSXBTTaa9YOpRo0TpjpdYeSLPDy5QDLv6yT/GpdG8uPCx4eBnReXusl6Eixuj+ GA6wkTPnLZ5Yu7vW+/g+po+LyRbXpsjMKIaJv4fhpOoIkomCotBMYRQDQw5uNOOhhAYc EeYdtoFgapLYQzOqMHbGsT2NO9cdoMCIekvjRMbDj52Cj/hNO5anMVr2KaAdixh2dsQu d86Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=z6InhYcFfQV4kfNF3EKRRmV6b/y4TH6TyIbYstwZzDg=; b=I+vV7yZWA5x5Ul01GVdiA9Ld5xZOoSoLqBCZvL3WKvYekF/d6E6QgCJVjW3ju8IVo5 P+uv7udOtyp3yBzQBwvTY7h7V8l0UPXiLn3xTajavSZ2VP60qS3HkgtKphfPUpQT1KcX gdlDUFK26cxIqXObdB1EGCgBZ7jo90KIk7O/Y6BNWkcP+oP9ihZ1KBb8RtVNbcIBa4w2 XKlVlNac9AFi3WxpVpuk4DLNl3yRtaKywLtLbZFdOoQKIe07DiKE/wcGfUHJwrwnNko+ AnCJFgpVkm7PNa4WCm/FvOMGAcwJm50wOhy5R/tHfTWdeKuON6F5BWdodke/rGyVoLez Lg8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@rbox.co header.s=selector2 header.b=frT7bzA0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=rbox.co Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a27-20020aa78e9b000000b0064f4eb8dd2dsi5257746pfr.204.2023.06.05.04.55.18; Mon, 05 Jun 2023 04:55:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@rbox.co header.s=selector2 header.b=frT7bzA0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=rbox.co Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232905AbjFELxW (ORCPT + 99 others); Mon, 5 Jun 2023 07:53:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34432 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232698AbjFELxV (ORCPT ); Mon, 5 Jun 2023 07:53:21 -0400 Received: from mailtransmit05.runbox.com (mailtransmit05.runbox.com [IPv6:2a0c:5a00:149::26]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CDEB1A7; Mon, 5 Jun 2023 04:53:19 -0700 (PDT) Received: from mailtransmit03.runbox ([10.9.9.163] helo=aibo.runbox.com) by mailtransmit05.runbox.com with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.93) (envelope-from ) id 1q68lx-00BV67-DW; Mon, 05 Jun 2023 13:53:17 +0200 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=rbox.co; s=selector2; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From: References:Cc:To:Subject:MIME-Version:Date:Message-ID; bh=z6InhYcFfQV4kfNF3EKRRmV6b/y4TH6TyIbYstwZzDg=; b=frT7bzA0QICy8T4dPdgzjpMs8+ OL9JFeOPhv8J4pRRDHKX6cHZ1eZ0VFKtZHVicBAhUAqBEyIPkQKogo1XHw7OZOU5DPNpb0Y3cYosS XWpQ/CpXst/+tNAS9nyWyn2jSwkeREAzBtMBN/7c4qMhK5weP/2LMxep7KECyav3aIde87SOA9ih5 Z8puFwlsXyW55PBU699Xz5uU86y4NqCfP+nAgJ4NdLXvzbzipAv+X5G+whgpkZLhCqiYF5iI4oy9s pS7NVQOaLVVqjtvJ36oiDeZI5uNm7+4IsP5B0S7Rz35HKN87xFD3BMgzRbRLS6MYbER8yzYDzjGiJ rJyJ4bIQ==; Received: from [10.9.9.74] (helo=submission03.runbox) by mailtransmit03.runbox with esmtp (Exim 4.86_2) (envelope-from ) id 1q68lw-00070x-LP; Mon, 05 Jun 2023 13:53:16 +0200 Received: by submission03.runbox with esmtpsa [Authenticated ID (604044)] (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) id 1q68lu-0002P0-No; Mon, 05 Jun 2023 13:53:14 +0200 Message-ID: <7a4a503d-9fc4-d366-02b4-bc145943bd45@rbox.co> Date: Mon, 5 Jun 2023 13:53:13 +0200 MIME-Version: 1.0 User-Agent: Thunderbird Subject: Re: [PATCH v2] KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond Content-Language: pl-PL, en-GB To: Sean Christopherson Cc: dmatlack@google.com, mizhang@google.com, isaku.yamahata@gmail.com, pbonzini@redhat.com, Wei Wang , kvm@vger.kernel.org, linux-kernel@vger.kernel.org References: <20230307135233.54684-1-wei.w.wang@intel.com> <168565180722.660019.15543226381784798973.b4-ty@google.com> <8f319a1e-a869-b666-b606-c0b4764ef7b1@rbox.co> From: Michal Luczaj In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 6/2/23 18:56, Sean Christopherson wrote: > On Fri, Jun 02, 2023, Michal Luczaj wrote: >> I guess this makes the !! in kvm_vm_ioctl_create_vcpu() unnecessary: >> >> KVM_BUG_ON(!!xa_store(&kvm->vcpu_array, vcpu->vcpu_idx, vcpu, 0)... > > Ya, I saw that, which in addition to Wei's ping, is what reminded me that the > KVM_BUG_ON() fix hadn't been merged. > >> Is it worth a patch (perhaps along with chopping off !! in >> kvm_msr_allowed() and few other places)? > > Yes, I think so. OK, so xa_store() aside[*], I see some bool-to-bools: arch/x86/kvm/x86.c: kvm_msr_allowed():allowed = !!test_bit(index - start, bitmap); arch/x86/kvm/hyperv.c: kvm_hv_hypercall():hc.rep = !!(hc.rep_cnt || hc.rep_idx); arch/x86/kvm/mmu/mmu.c: update_pkru_bitmask(): pkey_bits = !!check_pkey; pkey_bits |= (!!check_write) << 1; arch/x86/kvm/svm/svm.c: msr_write_intercepted():return !!test_bit(bit_write, &tmp); svm_vcpu_after_set_cpuid(): 2x set_msr_interception... tools/testing/selftests/kvm/x86_64/vmx_exception_with_invalid_guest_state.c: set_or_clear_invalid_guest_state():sregs.tr.unusable = !!set; But perhaps this is a matter of style and those were meant to be this kind-of explicit? [*] https://lore.kernel.org/kvm/20230605114852.288964-1-mhal@rbox.co/