All of lore.kernel.org
 help / color / mirror / Atom feed
From: Oleksii Kurochko <oleksii.kurochko@gmail.com>
To: Jan Beulich <jbeulich@suse.com>
Cc: "Romain Caritey" <Romain.Caritey@microchip.com>,
	"Alistair Francis" <alistair.francis@wdc.com>,
	"Connor Davis" <connojdavis@gmail.com>,
	"Andrew Cooper" <andrew.cooper3@citrix.com>,
	"Anthony PERARD" <anthony.perard@vates.tech>,
	"Michal Orzel" <michal.orzel@amd.com>,
	"Julien Grall" <julien@xen.org>,
	"Roger Pau Monné" <roger.pau@citrix.com>,
	"Stefano Stabellini" <sstabellini@kernel.org>,
	xen-devel@lists.xenproject.org
Subject: Re: [PATCH v1 18/27] xen/riscv: add vaplic access check
Date: Tue, 14 Apr 2026 13:45:16 +0200	[thread overview]
Message-ID: <f0503bd6-3ea3-42da-9211-02836addc176@gmail.com> (raw)
In-Reply-To: <0519fb8a-48e3-4f36-8d6c-a966080ffb55@suse.com>



On 4/2/26 3:10 PM, Jan Beulich wrote:
> On 10.03.2026 18:08, Oleksii Kurochko wrote:
>> --- a/xen/arch/riscv/aplic.c
>> +++ b/xen/arch/riscv/aplic.c
>> @@ -38,6 +38,7 @@ static struct aplic_priv aplic = {
>>   
>>   static struct intc_info __ro_after_init aplic_info = {
>>       .hw_version = INTC_APLIC,
>> +    .private = &aplic,
> 
> Isn't this the host instance again? How can you ...
> 
>> --- a/xen/arch/riscv/vaplic.c
>> +++ b/xen/arch/riscv/vaplic.c
>> @@ -127,6 +127,20 @@ int vaplic_map_device_irqs_to_domain(struct domain *d,
>>       return 0;
>>   }
>>   
>> +static int cf_check vaplic_is_access(const struct vcpu *vcpu,
>> +                                     const unsigned long addr)
>> +{
>> +    const struct vaplic *vaplic = to_vaplic(vcpu->domain->arch.vintc);
>> +    const struct aplic_priv *priv = vaplic->base.info->private;
>> +    const paddr_t paddr_end = priv->paddr_start + priv->size;
>> +
>> +    /* check if it is an APLIC access */
>> +    if ( priv->paddr_start <= addr && addr < paddr_end )
> 
> ... use that here? Or asked differently, again: Where's the virtualization,
> i.e. the abstraction away from host properties?

With the current use case it was easier to choose such approach then 
provide the full abstraction.

> 
> Furthermore, is it really sufficient to check just the starting address of
> an access? Shouldn't the last byte accessed also fall into the range in
> question?

I think that it is okay, my understanding is that *paddr_end technically 
is another range.

> 
>> +        return 1;
>> +
>> +    return 0;
>> +}
> 
> This function looks to want to return bool (and then use true/false).

Agree, then it will also need to update function pointer prototype in 
vintc_ops.

Thanks.

~ Oleksii


  reply	other threads:[~2026-04-14 11:45 UTC|newest]

Thread overview: 123+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-03-10 17:08 [PATCH v1 00/27] [RISC-V] Introduce enablemenant of dom0less Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 01/27] xen/riscv: Implement ARCH_PAGING_MEMPOOL Oleksii Kurochko
2026-03-11  8:18   ` Jan Beulich
2026-04-09 10:31     ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 02/27] xen/riscv: Implement construct_domain() Oleksii Kurochko
2026-03-24  9:37   ` Jan Beulich
2026-04-09 11:26     ` Oleksii Kurochko
2026-04-09 12:58       ` Jan Beulich
2026-04-09 13:39         ` Oleksii Kurochko
2026-04-09 14:01           ` Oleksii Kurochko
2026-04-14  6:26           ` Julien Grall
2026-03-10 17:08 ` [PATCH v1 03/27] xen/riscv: implement prerequisites for domain_create() Oleksii Kurochko
2026-04-01 12:57   ` Jan Beulich
2026-04-09 11:55     ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 04/27] xen/riscv: rework G-stage mode handling Oleksii Kurochko
2026-04-01 13:19   ` Jan Beulich
2026-04-07 10:47     ` Oleksii Kurochko
2026-04-07 13:43       ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 05/27] xen/riscv: introduce guest riscv,isa string Oleksii Kurochko
2026-04-01 13:49   ` Jan Beulich
2026-04-10 10:24     ` Oleksii Kurochko
2026-04-10 10:50       ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 06/27] xen/riscv: implement make_cpus_node() Oleksii Kurochko
2026-04-01 14:11   ` Jan Beulich
2026-04-10 11:19     ` Oleksii Kurochko
2026-04-10 12:02       ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 07/27] xen/riscv: implement make_timer_node() Oleksii Kurochko
2026-04-01 14:24   ` Jan Beulich
2026-04-10 11:54     ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 08/27] xen/riscv: implement make_arch_nodes() Oleksii Kurochko
2026-04-01 14:29   ` Jan Beulich
2026-04-10 13:32     ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 09/27] xen/riscv: implement make_intc_domU_node() Oleksii Kurochko
2026-04-01 14:38   ` Jan Beulich
2026-04-10 14:00     ` Oleksii Kurochko
2026-04-10 14:23       ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 10/27] xen/riscv: generate IMSIC DT node for guest domains Oleksii Kurochko
2026-04-01 15:05   ` Jan Beulich
2026-04-10 15:40     ` Oleksii Kurochko
2026-04-16 11:42       ` Jan Beulich
2026-04-17  8:10         ` Oleksii Kurochko
2026-04-17 13:50           ` Jan Beulich
2026-04-17 14:01             ` Oleksii Kurochko
2026-04-17 14:10               ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 11/27] xen/riscv: create APLIC " Oleksii Kurochko
2026-04-01 15:16   ` Jan Beulich
2026-04-13  8:43     ` Oleksii Kurochko
2026-04-13  8:48       ` Oleksii Kurochko
2026-04-16 11:49       ` Jan Beulich
2026-04-17  9:01         ` Oleksii Kurochko
2026-04-17 13:53           ` Jan Beulich
2026-04-17 14:27             ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 12/27] xen/riscv: introduce aia_init() and aia_available() Oleksii Kurochko
2026-04-02  9:00   ` Jan Beulich
2026-04-13  9:32     ` Oleksii Kurochko
2026-04-16 12:06       ` Jan Beulich
2026-04-17  9:37         ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 13/27] xen/riscv: add basic VGEIN management for AIA guests Oleksii Kurochko
2026-04-02 10:03   ` Jan Beulich
2026-04-13 14:42     ` Oleksii Kurochko
2026-04-16 12:21       ` Jan Beulich
2026-04-17 11:34         ` Oleksii Kurochko
2026-04-17 14:07           ` Jan Beulich
2026-04-20  7:52             ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 14/27] xen/riscv: introduce per-vCPU IMSIC state Oleksii Kurochko
2026-04-02 11:31   ` Jan Beulich
2026-04-14  9:22     ` Oleksii Kurochko
2026-04-16 12:31       ` Jan Beulich
2026-04-17 13:47         ` Oleksii Kurochko
2026-04-20  8:29           ` Jan Beulich
2026-04-16 12:31       ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 15/27] xen/riscv: add very early virtual APLIC (vAPLIC) initialization support Oleksii Kurochko
2026-04-02 11:58   ` Jan Beulich
2026-04-14 10:27     ` Oleksii Kurochko
2026-04-16 12:42       ` Jan Beulich
2026-04-20 10:25         ` Oleksii Kurochko
2026-04-20 10:47           ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 16/27] xen/riscv: implement IRQ mapping for device passthrough Oleksii Kurochko
2026-04-02 12:22   ` Jan Beulich
2026-04-14 11:29     ` Oleksii Kurochko
2026-04-16 12:51       ` Jan Beulich
2026-04-20 11:39         ` Oleksii Kurochko
2026-04-20 13:45           ` Jan Beulich
2026-04-20 14:34             ` Oleksii Kurochko
2026-04-20 15:21               ` Jan Beulich
2026-04-20 15:31                 ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 17/27] xen/riscv: add missing APLIC register offsets, masks to asm/aplic.h Oleksii Kurochko
2026-04-02 12:51   ` Jan Beulich
2026-04-14 11:42     ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 18/27] xen/riscv: add vaplic access check Oleksii Kurochko
2026-04-02 13:10   ` Jan Beulich
2026-04-14 11:45     ` Oleksii Kurochko [this message]
2026-04-15  7:35       ` Oleksii Kurochko
2026-04-16 13:01       ` Jan Beulich
2026-04-20 11:53         ` Oleksii Kurochko
2026-04-20 12:03           ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 19/27] xen/riscv: emulate guest writes to virtual APLIC MMIO Oleksii Kurochko
2026-04-02 14:18   ` Jan Beulich
2026-04-14 16:04     ` Oleksii Kurochko
2026-04-16 13:19       ` Jan Beulich
2026-04-20 15:02         ` Oleksii Kurochko
2026-04-20 15:27           ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 20/27] xen/riscv: emulate guest reads from " Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 21/27] xen/riscv: introduce (de)initialization helpers for vINTC Oleksii Kurochko
2026-04-02 14:58   ` Jan Beulich
2026-04-15  7:50     ` Oleksii Kurochko
2026-04-16 13:23       ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 22/27] xen/riscv: implement init_intc_phandle() Oleksii Kurochko
2026-04-02 15:00   ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 23/27] xen/riscv: call do_initcalls() in start_xen() Oleksii Kurochko
2026-04-02 15:01   ` Jan Beulich
2026-03-10 17:08 ` [PATCH v1 24/27] xen/riscv: init rcu Oleksii Kurochko
2026-04-02 15:03   ` Jan Beulich
2026-04-14 11:50     ` Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 25/27] xen/riscv: setup system domains Oleksii Kurochko
2026-03-10 17:08 ` [PATCH v1 26/27] xen/riscv: provide init_vuart() Oleksii Kurochko
2026-04-07 13:52   ` Jan Beulich
2026-03-10 17:09 ` [PATCH v1 27/27] xen/riscv: add initial dom0less infrastructure support Oleksii Kurochko
2026-04-07 14:11   ` Jan Beulich
2026-04-15 10:00     ` Oleksii Kurochko
2026-04-16 14:13       ` Jan Beulich
2026-04-15 10:28     ` Oleksii Kurochko
2026-04-16 14:15       ` Jan Beulich

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=f0503bd6-3ea3-42da-9211-02836addc176@gmail.com \
    --to=oleksii.kurochko@gmail.com \
    --cc=Romain.Caritey@microchip.com \
    --cc=alistair.francis@wdc.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=anthony.perard@vates.tech \
    --cc=connojdavis@gmail.com \
    --cc=jbeulich@suse.com \
    --cc=julien@xen.org \
    --cc=michal.orzel@amd.com \
    --cc=roger.pau@citrix.com \
    --cc=sstabellini@kernel.org \
    --cc=xen-devel@lists.xenproject.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.