Patch Series

Subject KVM: arm64: Add LR overflow infrastructure
Author maz@kernel.org
Date 2025-11-03 16:54:45 +0000 UTC
Version 1
Cc christoffer.dall@arm.com joey.gouly@arm.com kvm@vger.kernel.org kvmarm@lists.linux.dev linux-arm-kernel@lists.infradead.org maz@kernel.org oliver.upton@linux.dev suzuki.poulose@arm.com volodymyr_babchuk@epam.com yuzenghui@huawei.com

Patches (33)

Name Content [All]
[PATCH 01/33] irqchip/gic: Add missing GICH_HCR control bits [Body]
[PATCH 02/33] irqchip/gic: Expose CPU interface VA to KVM [Body]
[PATCH 03/33] irqchip/apple-aic: Spit out ICH_MIDR_EL2 value on spurious vGIC MI [Body]
[PATCH 04/33] KVM: arm64: Turn vgic-v3 errata traps into a patched-in constant [Body]
[PATCH 05/33] KVM: arm64: GICv3: Detect and work around the lack of ICV_DIR_EL1 trapping [Body]
[PATCH 06/33] KVM: arm64: Repack struct vgic_irq fields [Body]
[PATCH 07/33] KVM: arm64: Add tracking of vgic_irq being present in a LR [Body]
[PATCH 08/33] KVM: arm64: Add LR overflow handling documentation [Body]
[PATCH 09/33] KVM: arm64: GICv3: Drop LPI active state when folding LRs [Body]
[PATCH 10/33] KVM: arm64: GICv3: Preserve EOIcount on exit [Body]
[PATCH 11/33] KVM: arm64: GICv3: Decouple ICH_HCR_EL2 programming from LRs [Body]
[PATCH 12/33] KVM: arm64: GICv3: Extract LR folding primitive [Body]
[PATCH 13/33] KVM: arm64: GICv3: Extract LR computing primitive [Body]
[PATCH 14/33] KVM: arm64: GICv2: Preserve EOIcount on exit [Body]
[PATCH 15/33] KVM: arm64: GICv2: Decouple GICH_HCR programming from LRs being loaded [Body]
[PATCH 16/33] KVM: arm64: GICv2: Extract LR folding primitive [Body]
[PATCH 17/33] KVM: arm64: GICv2: Extract LR computing primitive [Body]
[PATCH 18/33] KVM: arm64: Compute vgic state irrespective of the number of interrupts [Body]
[PATCH 19/33] KVM: arm64: Eagerly save VMCR on exit [Body]
[PATCH 20/33] KVM: arm64: Revamp vgic maintenance interrupt configuration [Body]
[PATCH 21/33] KVM: arm64: Make vgic_target_oracle() globally available [Body]
[PATCH 22/33] KVM: arm64: Invert ap_list sorting to push active interrupts out [Body]
[PATCH 23/33] KVM: arm64: Move undeliverable interrupts to the end of ap_list [Body]
[PATCH 24/33] KVM: arm64: Use MI to detect groups being enabled/disabled [Body]
[PATCH 25/33] KVM: arm64: Add AP-list overflow split/splice [Body]
[PATCH 26/33] KVM: arm64: GICv3: Handle LR overflow when EOImode==0 [Body]
[PATCH 27/33] KVM: arm64: GICv3: Handle deactivation via ICV_DIR_EL1 traps [Body]
[PATCH 28/33] KVM: arm64: GICv3: Add GICv2 SGI handling to deactivation primitive [Body]
[PATCH 29/33] KVM: arm64: GICv3: Set ICH_HCR_EL2.TDIR when interrupts overflow LR capacity [Body]
[PATCH 30/33] KVM: arm64: GICv2: Handle LR overflow when EOImode==0 [Body]
[PATCH 31/33] KVM: arm64: GICv2: Handle deactivation via GICV_DIR traps [Body]
[PATCH 32/33] KVM: arm64: GICv2: Always trap GICV_DIR register [Body]
[PATCH 33/33] KVM: arm64: GICv3: Add SPI tracking to handle asymmetric deactivation [Body]

Session 2025-11-03

ID (for dev) fecb0bac-75b4-4708-ac7f-fb204a3c1bee
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base fd57572253bc356330dbe5b233c2e1d8426c66fd [Config] passed [Log]
[KASAN] Boot test: Base fd57572253bc356330dbe5b233c2e1d8426c66fd [Config] passed
[KASAN] Build Patched fd57572253bc356330dbe5b233c2e1d8426c66fd [Config] [patched] passed [Log]
[KASAN] Boot test: Patched fd57572253bc356330dbe5b233c2e1d8426c66fd [Config] [patched] passed
[KASAN] Fuzzing fd57572253bc356330dbe5b233c2e1d8426c66fd [Config] fd57572253bc356330dbe5b233c2e1d8426c66fd [Config] [patched] skipped [Log] [Artifacts]