[{"id":3673372,"web_url":"http://patchwork.ozlabs.org/comment/3673372/","msgid":"<SE3PR04MB8922EEE514B57D2D54BD7AA5F35FA@SE3PR04MB8922.apcprd04.prod.outlook.com>","list_archive_url":null,"date":"2026-04-04T03:25:22","subject":"Re: [PATCH v8 2/3] RISC-V: KVM: Cache gstage pgd_levels in struct\n kvm_gstage","submitter":{"id":91422,"url":"http://patchwork.ozlabs.org/api/people/91422/","name":"Nutty.Liu","email":"nutty.liu@hotmail.com"},"content":"On 4/3/2026 11:30 PM, fangyu.yu@linux.alibaba.com wrote:\n> From: Fangyu Yu <fangyu.yu@linux.alibaba.com>\n>\n> Gstage page-table helpers frequently chase gstage->kvm->arch to\n> fetch pgd_levels. This adds noise and repeats the same dereference\n> chain in hot paths.\n>\n> Add pgd_levels to struct kvm_gstage and initialize it from kvm->arch\n> when setting up a gstage instance. Introduce kvm_riscv_gstage_init()\n> to centralize initialization and switch gstage code to use\n> gstage->pgd_levels.\n>\n> Suggested-by: Anup Patel <anup@brainfault.org>\n> Signed-off-by: Fangyu Yu <fangyu.yu@linux.alibaba.com>\n> Reviewed-by: Anup Patel <anup@brainfault.org>\nReviewed-by: Nutty Liu <nutty.liu@hotmail.com>\n\nThanks,\nNutty\n> ---\n>   arch/riscv/include/asm/kvm_gstage.h | 10 ++++++\n>   arch/riscv/kvm/gstage.c             | 10 +++---\n>   arch/riscv/kvm/mmu.c                | 50 ++++++-----------------------\n>   3 files changed, 25 insertions(+), 45 deletions(-)\n>\n> diff --git a/arch/riscv/include/asm/kvm_gstage.h b/arch/riscv/include/asm/kvm_gstage.h\n> index 5aa58d1f692a..70d9d483365e 100644\n> --- a/arch/riscv/include/asm/kvm_gstage.h\n> +++ b/arch/riscv/include/asm/kvm_gstage.h\n> @@ -15,6 +15,7 @@ struct kvm_gstage {\n>   #define KVM_GSTAGE_FLAGS_LOCAL\t\tBIT(0)\n>   \tunsigned long vmid;\n>   \tpgd_t *pgd;\n> +\tunsigned long pgd_levels;\n>   };\n>   \n>   struct kvm_gstage_mapping {\n> @@ -92,4 +93,13 @@ static inline unsigned long kvm_riscv_gstage_mode(unsigned long pgd_levels)\n>   \t}\n>   }\n>   \n> +static inline void kvm_riscv_gstage_init(struct kvm_gstage *gstage, struct kvm *kvm)\n> +{\n> +\tgstage->kvm = kvm;\n> +\tgstage->flags = 0;\n> +\tgstage->vmid = READ_ONCE(kvm->arch.vmid.vmid);\n> +\tgstage->pgd = kvm->arch.pgd;\n> +\tgstage->pgd_levels = kvm->arch.pgd_levels;\n> +}\n> +\n>   #endif\n> diff --git a/arch/riscv/kvm/gstage.c b/arch/riscv/kvm/gstage.c\n> index 4beb9322fe76..7c4c34bc191b 100644\n> --- a/arch/riscv/kvm/gstage.c\n> +++ b/arch/riscv/kvm/gstage.c\n> @@ -26,7 +26,7 @@ static inline unsigned long gstage_pte_index(struct kvm_gstage *gstage,\n>   \tunsigned long mask;\n>   \tunsigned long shift = HGATP_PAGE_SHIFT + (kvm_riscv_gstage_index_bits * level);\n>   \n> -\tif (level == gstage->kvm->arch.pgd_levels - 1)\n> +\tif (level == gstage->pgd_levels - 1)\n>   \t\tmask = (PTRS_PER_PTE * (1UL << kvm_riscv_gstage_pgd_xbits)) - 1;\n>   \telse\n>   \t\tmask = PTRS_PER_PTE - 1;\n> @@ -45,7 +45,7 @@ static int gstage_page_size_to_level(struct kvm_gstage *gstage, unsigned long pa\n>   \tu32 i;\n>   \tunsigned long psz = 1UL << 12;\n>   \n> -\tfor (i = 0; i < gstage->kvm->arch.pgd_levels; i++) {\n> +\tfor (i = 0; i < gstage->pgd_levels; i++) {\n>   \t\tif (page_size == (psz << (i * kvm_riscv_gstage_index_bits))) {\n>   \t\t\t*out_level = i;\n>   \t\t\treturn 0;\n> @@ -58,7 +58,7 @@ static int gstage_page_size_to_level(struct kvm_gstage *gstage, unsigned long pa\n>   static int gstage_level_to_page_order(struct kvm_gstage *gstage, u32 level,\n>   \t\t\t\t      unsigned long *out_pgorder)\n>   {\n> -\tif (gstage->kvm->arch.pgd_levels < level)\n> +\tif (gstage->pgd_levels < level)\n>   \t\treturn -EINVAL;\n>   \n>   \t*out_pgorder = 12 + (level * kvm_riscv_gstage_index_bits);\n> @@ -83,7 +83,7 @@ bool kvm_riscv_gstage_get_leaf(struct kvm_gstage *gstage, gpa_t addr,\n>   \t\t\t       pte_t **ptepp, u32 *ptep_level)\n>   {\n>   \tpte_t *ptep;\n> -\tu32 current_level = gstage->kvm->arch.pgd_levels - 1;\n> +\tu32 current_level = gstage->pgd_levels - 1;\n>   \n>   \t*ptep_level = current_level;\n>   \tptep = (pte_t *)gstage->pgd;\n> @@ -127,7 +127,7 @@ int kvm_riscv_gstage_set_pte(struct kvm_gstage *gstage,\n>   \t\t\t     struct kvm_mmu_memory_cache *pcache,\n>   \t\t\t     const struct kvm_gstage_mapping *map)\n>   {\n> -\tu32 current_level = gstage->kvm->arch.pgd_levels - 1;\n> +\tu32 current_level = gstage->pgd_levels - 1;\n>   \tpte_t *next_ptep = (pte_t *)gstage->pgd;\n>   \tpte_t *ptep = &next_ptep[gstage_pte_index(gstage, map->addr, current_level)];\n>   \n> diff --git a/arch/riscv/kvm/mmu.c b/arch/riscv/kvm/mmu.c\n> index fbcdd75cb9af..2d3def024270 100644\n> --- a/arch/riscv/kvm/mmu.c\n> +++ b/arch/riscv/kvm/mmu.c\n> @@ -24,10 +24,7 @@ static void mmu_wp_memory_region(struct kvm *kvm, int slot)\n>   \tphys_addr_t end = (memslot->base_gfn + memslot->npages) << PAGE_SHIFT;\n>   \tstruct kvm_gstage gstage;\n>   \n> -\tgstage.kvm = kvm;\n> -\tgstage.flags = 0;\n> -\tgstage.vmid = READ_ONCE(kvm->arch.vmid.vmid);\n> -\tgstage.pgd = kvm->arch.pgd;\n> +\tkvm_riscv_gstage_init(&gstage, kvm);\n>   \n>   \tspin_lock(&kvm->mmu_lock);\n>   \tkvm_riscv_gstage_wp_range(&gstage, start, end);\n> @@ -49,10 +46,7 @@ int kvm_riscv_mmu_ioremap(struct kvm *kvm, gpa_t gpa, phys_addr_t hpa,\n>   \tstruct kvm_gstage_mapping map;\n>   \tstruct kvm_gstage gstage;\n>   \n> -\tgstage.kvm = kvm;\n> -\tgstage.flags = 0;\n> -\tgstage.vmid = READ_ONCE(kvm->arch.vmid.vmid);\n> -\tgstage.pgd = kvm->arch.pgd;\n> +\tkvm_riscv_gstage_init(&gstage, kvm);\n>   \n>   \tend = (gpa + size + PAGE_SIZE - 1) & PAGE_MASK;\n>   \tpfn = __phys_to_pfn(hpa);\n> @@ -89,10 +83,7 @@ void kvm_riscv_mmu_iounmap(struct kvm *kvm, gpa_t gpa, unsigned long size)\n>   {\n>   \tstruct kvm_gstage gstage;\n>   \n> -\tgstage.kvm = kvm;\n> -\tgstage.flags = 0;\n> -\tgstage.vmid = READ_ONCE(kvm->arch.vmid.vmid);\n> -\tgstage.pgd = kvm->arch.pgd;\n> +\tkvm_riscv_gstage_init(&gstage, kvm);\n>   \n>   \tspin_lock(&kvm->mmu_lock);\n>   \tkvm_riscv_gstage_unmap_range(&gstage, gpa, size, false);\n> @@ -109,10 +100,7 @@ void kvm_arch_mmu_enable_log_dirty_pt_masked(struct kvm *kvm,\n>   \tphys_addr_t end = (base_gfn + __fls(mask) + 1) << PAGE_SHIFT;\n>   \tstruct kvm_gstage gstage;\n>   \n> -\tgstage.kvm = kvm;\n> -\tgstage.flags = 0;\n> -\tgstage.vmid = READ_ONCE(kvm->arch.vmid.vmid);\n> -\tgstage.pgd = kvm->arch.pgd;\n> +\tkvm_riscv_gstage_init(&gstage, kvm);\n>   \n>   \tkvm_riscv_gstage_wp_range(&gstage, start, end);\n>   }\n> @@ -141,10 +129,7 @@ void kvm_arch_flush_shadow_memslot(struct kvm *kvm,\n>   \tphys_addr_t size = slot->npages << PAGE_SHIFT;\n>   \tstruct kvm_gstage gstage;\n>   \n> -\tgstage.kvm = kvm;\n> -\tgstage.flags = 0;\n> -\tgstage.vmid = READ_ONCE(kvm->arch.vmid.vmid);\n> -\tgstage.pgd = kvm->arch.pgd;\n> +\tkvm_riscv_gstage_init(&gstage, kvm);\n>   \n>   \tspin_lock(&kvm->mmu_lock);\n>   \tkvm_riscv_gstage_unmap_range(&gstage, gpa, size, false);\n> @@ -250,10 +235,7 @@ bool kvm_unmap_gfn_range(struct kvm *kvm, struct kvm_gfn_range *range)\n>   \tif (!kvm->arch.pgd)\n>   \t\treturn false;\n>   \n> -\tgstage.kvm = kvm;\n> -\tgstage.flags = 0;\n> -\tgstage.vmid = READ_ONCE(kvm->arch.vmid.vmid);\n> -\tgstage.pgd = kvm->arch.pgd;\n> +\tkvm_riscv_gstage_init(&gstage, kvm);\n>   \tmmu_locked = spin_trylock(&kvm->mmu_lock);\n>   \tkvm_riscv_gstage_unmap_range(&gstage, range->start << PAGE_SHIFT,\n>   \t\t\t\t     (range->end - range->start) << PAGE_SHIFT,\n> @@ -275,10 +257,7 @@ bool kvm_age_gfn(struct kvm *kvm, struct kvm_gfn_range *range)\n>   \n>   \tWARN_ON(size != PAGE_SIZE && size != PMD_SIZE && size != PUD_SIZE);\n>   \n> -\tgstage.kvm = kvm;\n> -\tgstage.flags = 0;\n> -\tgstage.vmid = READ_ONCE(kvm->arch.vmid.vmid);\n> -\tgstage.pgd = kvm->arch.pgd;\n> +\tkvm_riscv_gstage_init(&gstage, kvm);\n>   \tif (!kvm_riscv_gstage_get_leaf(&gstage, range->start << PAGE_SHIFT,\n>   \t\t\t\t       &ptep, &ptep_level))\n>   \t\treturn false;\n> @@ -298,10 +277,7 @@ bool kvm_test_age_gfn(struct kvm *kvm, struct kvm_gfn_range *range)\n>   \n>   \tWARN_ON(size != PAGE_SIZE && size != PMD_SIZE && size != PUD_SIZE);\n>   \n> -\tgstage.kvm = kvm;\n> -\tgstage.flags = 0;\n> -\tgstage.vmid = READ_ONCE(kvm->arch.vmid.vmid);\n> -\tgstage.pgd = kvm->arch.pgd;\n> +\tkvm_riscv_gstage_init(&gstage, kvm);\n>   \tif (!kvm_riscv_gstage_get_leaf(&gstage, range->start << PAGE_SHIFT,\n>   \t\t\t\t       &ptep, &ptep_level))\n>   \t\treturn false;\n> @@ -463,10 +439,7 @@ int kvm_riscv_mmu_map(struct kvm_vcpu *vcpu, struct kvm_memory_slot *memslot,\n>   \tstruct kvm_gstage gstage;\n>   \tstruct page *page;\n>   \n> -\tgstage.kvm = kvm;\n> -\tgstage.flags = 0;\n> -\tgstage.vmid = READ_ONCE(kvm->arch.vmid.vmid);\n> -\tgstage.pgd = kvm->arch.pgd;\n> +\tkvm_riscv_gstage_init(&gstage, kvm);\n>   \n>   \t/* Setup initial state of output mapping */\n>   \tmemset(out_map, 0, sizeof(*out_map));\n> @@ -587,10 +560,7 @@ void kvm_riscv_mmu_free_pgd(struct kvm *kvm)\n>   \n>   \tspin_lock(&kvm->mmu_lock);\n>   \tif (kvm->arch.pgd) {\n> -\t\tgstage.kvm = kvm;\n> -\t\tgstage.flags = 0;\n> -\t\tgstage.vmid = READ_ONCE(kvm->arch.vmid.vmid);\n> -\t\tgstage.pgd = kvm->arch.pgd;\n> +\t\tkvm_riscv_gstage_init(&gstage, kvm);\n>   \t\tkvm_riscv_gstage_unmap_range(&gstage, 0UL,\n>   \t\t\tkvm_riscv_gstage_gpa_size(kvm->arch.pgd_levels), false);\n>   \t\tpgd = READ_ONCE(kvm->arch.pgd);","headers":{"Return-Path":"\n <kvm-riscv-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=jjPFyS0Y;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=hotmail.com header.i=@hotmail.com header.a=rsa-sha256\n header.s=selector1 header.b=ZU1hQsOF;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=kvm-riscv-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fngwV4cQSz1xtJ\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 04 Apr 2026 14:25:57 +1100 (AEDT)","from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w8rds-000000034TZ-1Ces;\n\tSat, 04 Apr 2026 03:25:48 +0000","from mail-japaneastazolkn190120002.outbound.protection.outlook.com\n ([2a01:111:f403:d405::2] helo=TYPPR03CU001.outbound.protection.outlook.com)\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w8rdo-000000034TA-21xO;\n\tSat, 04 Apr 2026 03:25:45 +0000","from SE3PR04MB8922.apcprd04.prod.outlook.com (2603:1096:101:2e9::7)\n by JH0PR04MB7622.apcprd04.prod.outlook.com (2603:1096:990:5e::11) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9769.21; Sat, 4 Apr\n 2026 03:25:32 +0000","from SE3PR04MB8922.apcprd04.prod.outlook.com\n ([fe80::3450:f139:5238:8f58]) by SE3PR04MB8922.apcprd04.prod.outlook.com\n ([fe80::3450:f139:5238:8f58%6]) with mapi id 15.20.9769.017; Sat, 4 Apr 2026\n 03:25:32 +0000"],"DKIM-Signature":["v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:Content-Type:\n\tContent-Transfer-Encoding:List-Subscribe:List-Help:List-Post:List-Archive:\n\tList-Unsubscribe:List-Id:MIME-Version:In-Reply-To:From:References:Cc:To:\n\tSubject:Date:Message-ID:Reply-To:Content-ID:Content-Description:Resent-Date:\n\tResent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner;\n\tbh=LTUBITiGPz5fsxwkbOnJaTUwkQCiPw5tQPNHtvZeF5Y=; b=jjPFyS0YpOKNLOt9E9LFeyhF/h\n\tH1ZpA8H/BzCz9WAfvaigt3evfc9ae1tltR1mkzm/KjEF94rJUSnz0b/MpffuT1PhC3facROQqUlad\n\t5mUkd0sCEaTnNsI8H1fBuhlTBeTSQK+nKno8w7CoOfqGVg9o5eUm6dJUxjGwuYxk6G277dTEJLt91\n\tEwf840XK66foDaEOEvu2YgK5QJaaOBznaZFevd3lEjcSh+TaKIT+mrzzNnP6VYgPTX7lG4UR9pEzm\n\tjB5GDGC8xZ6Y4r5RoBOu/W9TpxlREz9QWtpn/+M9NAD8ja9oP04pIbKsTca+a5ppuxm8dIJyDp2hq\n\tXxynr7mA==;","v=1; a=rsa-sha256; c=relaxed/relaxed; d=hotmail.com;\n s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=HrFIcKDpFoR7YyZHPbXBLvTmGe0ugEmr5TDUTobTuq4=;\n b=ZU1hQsOFqfVnHdT+CS6SqvPwDXDPRNrxkLDg2DPNo/ag9MGFEQBoNKAhbANSBqQFNnytwS/yU7t9vextTD5ROGfVluzb7zCoI1P+bzpOGfA3lbY32GpNUXja8gQZ1SGewOdyYnRvKE1NVPN9aL9loigpk2xm/Uy0p0b/BjTh4LGKazPXfB4KyYXVKey91Boq6hqmA5dk14Vsa3wLbpM5ngX4EIPuunLRwm08u2rBGuJuyT07+Gu/VIBHap75C3E8950SMAdAFzGeLqmQSNp7zWW6HZt8R+nHSk2AsoX1vXlnsuKpI8rPczHoMHvejROzTq6xGiPqFWiAhOjoukwBUA=="],"ARC-Seal":"i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=yhgkaW/EjraOQXn95PF37eV1zM0kcIYOuLbYO2AgefwWXuGGFkiaDTpbxpTZJj79GEb7+7iQvhuefTCmAp/tXEy2O8/dtOMknnL/KjqpEPdpsR7c18uVptFM+de0Ku/SAwVTuLaCEELdWNqxNLdjF62TTA7+ccisSEFzF9+LFQ7fzdz5RLmqAFvkkw8B0LI6fD9GgdxSn3J1HFgm25xl7p1LF7YTO+EvONXGGgGq3fG2lTG6U+5rX0VER7EbiInp8jy1pjLkFk18PCJK0jdHRgQq/CXIgxFXw0oZ+D2yb4i+L9B7lv0aKx0PLq9HUBZDienMVtDb3tkERQnj4JXFrw==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=HrFIcKDpFoR7YyZHPbXBLvTmGe0ugEmr5TDUTobTuq4=;\n b=vPIFZWsal/j0c279fCCpGj/ecNrEeDzH7UbEbyrSUbyOq97Rd+D/rUMusSD2pRjkVLzYMpi6a9N2g/KLSG51A9UbFTg/vZYEOpdKomHkYDCxO54Eb/rveF+gwlk9z4iAGd1f2cfuuowM3DVVcHTDBUeo+yq3LUabmxwmgVkRIxJx/vVgzFXro2dtDUinpLdQxn/XAPJ4VE+VJdU0Xmy+kIB1ONrnNVY/Rem8rVeVmzGoJcQqc5miChj2T+0WmkNss35W7yhqnL/+wNoybOdkmgSEBGCFNDmWiwYX5Me2crRvkErkcAzBCYq4Z/tpHEUCvgJQIO2Tiyg3pmEYTtbcXg==","ARC-Authentication-Results":"i=1; mx.microsoft.com 1; spf=none; dmarc=none;\n dkim=none; arc=none","Message-ID":"\n <SE3PR04MB8922EEE514B57D2D54BD7AA5F35FA@SE3PR04MB8922.apcprd04.prod.outlook.com>","Date":"Sat, 4 Apr 2026 11:25:22 +0800","User-Agent":"Mozilla Thunderbird","Subject":"Re: [PATCH v8 2/3] RISC-V: KVM: Cache gstage pgd_levels in struct\n kvm_gstage","To":"fangyu.yu@linux.alibaba.com, pbonzini@redhat.com, corbet@lwn.net,\n anup@brainfault.org, atish.patra@linux.dev, pjw@kernel.org,\n palmer@dabbelt.com, aou@eecs.berkeley.edu, alex@ghiti.fr,\n skhan@linuxfoundation.org","Cc":"guoren@kernel.org, radim.krcmar@oss.qualcomm.com,\n andrew.jones@oss.qualcomm.com, linux-doc@vger.kernel.org,\n kvm@vger.kernel.org, kvm-riscv@lists.infradead.org,\n linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org","References":"<20260403153019.9916-1-fangyu.yu@linux.alibaba.com>\n <20260403153019.9916-3-fangyu.yu@linux.alibaba.com>","Content-Language":"en-US","From":"\"Nutty.Liu\" <nutty.liu@hotmail.com>","In-Reply-To":"<20260403153019.9916-3-fangyu.yu@linux.alibaba.com>","X-ClientProxiedBy":"TY4PR01CA0043.jpnprd01.prod.outlook.com\n (2603:1096:405:2bd::16) To SE3PR04MB8922.apcprd04.prod.outlook.com\n (2603:1096:101:2e9::7)","X-Microsoft-Original-Message-ID":"\n <50c24bbb-d6c4-4775-beab-2ea42bd85741@hotmail.com>","MIME-Version":"1.0","X-MS-Exchange-MessageSentRepresentingType":"1","X-MS-PublicTrafficType":"Email","X-MS-TrafficTypeDiagnostic":"SE3PR04MB8922:EE_|JH0PR04MB7622:EE_","X-MS-Office365-Filtering-Correlation-Id":"1be47d08-fb62-474b-903f-08de91f9d366","X-MS-Exchange-SLBlob-MailProps":"\n obhAqMD0nT97+9kgwgO/mqEGtcymhevmECRKaMIBi/81O2VrwNjzpMYq5EZpkgoGMGv5ThI7lIuGug8TrgcZRiTH2VVAeN9uFRb/rHVoIChcMJo3jHJiBu8yslKz3roweEGr4rllAiXukCp9IKEZCz4f0BVeQfVdH5c7P+xNLWHp87hZlljgjWOG/weZo5/QP9F/s4d5uVVsz9gV/rz6R8ARJodGNtu2RkieZuKoA1xK0kzWBLOy340mZ07D73I3wTxnlUKEkwTXhOqPdY4usOAfA5ITG2OL3z6TkBdDPDslPXnIj0wbVhhQ/MNfgDPNWZ1fmsj1URz44U4ka18zybIHl9ioQgVZ4OTODIhhIkPt558lE7+1lAtSLNBLkrp+OV8w0kjX7hfeqbzvbgFpm2YiUyFy+k0xB4/E0sGFaNHNH/4VJXXeLQDOTTekfGiucRiWAuyCseucVe3OA4pXhzPvh5fpOdm+XJdXqe5lqKeVO+s0Hcxsoyr0FETxf8r6Kxwtw1J5FuVtFipulOB5oUA8xj2Y477qJ7cISVDtQF850L8JvsWjjldNJ/soztTCMe0fo7cMXbdd2fw/8198oCcCkSoJokMtTKT57ZsdspGBPQF7JvH87OQdA/jDMeSvNm4SaB77g1VEB9AQdTUQuVDZKqP754aXlM70FOMFNlyD4IuyekYrd5nTzN8s93Hlj854PgC75PhdE4D8BlEzdEimXDx8yniyqYCFuezF4GLYY+tFjqX50wFzgYFJiL1nBAdmOsBT+4oRoyIpj520p4Qnm72G01o1LpUQibOQmmu8GtSc/Halwm4ebvTpWOXA","X-Microsoft-Antispam":"\n BCL:0;ARA:14566002|51005399006|23021999003|19110799012|41001999006|5072599009|6090799003|461199028|8060799015|7042599007|15080799012|40105399003|3412199025|440099028|18061999006|12091999003|26121999003;","X-Microsoft-Antispam-Message-Info":"=?utf-8?q?hFySPtQMq9Lv4SBjYAmu0EMrV5UGIKs?=\n\t=?utf-8?q?Mn/7tWO3SB70V81HqtV9eQRcxLk24lOkzi9Jg3+6LtqYh0uEmeKud8iWP4qjbBnZQ?=\n\t=?utf-8?q?sHZ8FBCfuZEai3vTdlrjLlvzmwUyb06ZMAD8iStkDr3m2bH2xYzJRL7bgPd9YoTzx?=\n\t=?utf-8?q?h92FQergWHKXAhoKopeVPeDWqHtbY02ZgU30Gz4WZlncWFElN7jgx5WkjtjddbjTq?=\n\t=?utf-8?q?CzIsZCexbTI6IcjwG7+n2threinX+Ih6zvdBVG0FS2RFdFVGgXh5wU6K2ZOLYGs/L?=\n\t=?utf-8?q?n6GvvEYjwkTUyA9V5dYfzJzm+1xajXNww4uUZys1uiFta+hhwJ23U7g1sqYatJ5av?=\n\t=?utf-8?q?qecuau8L3UPQ4cED0PaznPiDMTd50ZMKGU/seIaTnYd+gLMqFtGVsWXi3LaJZbflb?=\n\t=?utf-8?q?JmY2eZD96gngZO6UGhaqIU/7RMnMnyEVuazY5IaMUfA3AexMQb6cRYVBPp3KIs6Xq?=\n\t=?utf-8?q?5gLDDstZSCwzIB/PYX3FKlqjZn1IYRmrjxxs0Ip258yB8gwIMJb8VyeZAyqbzHQ6E?=\n\t=?utf-8?q?k6o5x7ADYoF5aiBU3IK3JsLYB0Zh/LIyscPbD5cwI+LGWefuL3hwTuXuNkWg9AIHU?=\n\t=?utf-8?q?zwjXfU+9h07FVS8Vv/45Puuslp7ZaDOW7tE8UNBbECC/lm26ip9EVHMCP8piVKIEf?=\n\t=?utf-8?q?Uje3rQT77mO34Bu+zA75VSu6j89Ii3C7YSHKt852YWsNxgbRnGih4ie6bkfLY/GYU?=\n\t=?utf-8?q?gEugIgEW/Y82yDlW1jzwNLDNohhrc6SSSnbh4YBLKddVnqP1ccx6fQAsuozujR0H/?=\n\t=?utf-8?q?Okhp3ML8mVA31ykd7D1IiR/JYu4Hr7Z8gYjzukoWzAOzEPh/SDwRCUx1m9vFYN2nT?=\n\t=?utf-8?q?4kfDaJGPakdV3HTpkOUT8ZTyrHSK6OgCQtCHqukJP1DPhHsRRCF/BNtwuKkPQMOxO?=\n\t=?utf-8?q?sBM6uvsDeSU3wo1XeNjACfmpUWjJvbsjKJoiekXlTIIJinJOZzBQu+daPbQrp/GuE?=\n\t=?utf-8?q?65Vq5AdUmCvif9YM0eZrxM3Y2JQKRFE9YsDD+rMVWmjzld6pQ3IIKRK735nKRlatP?=\n\t=?utf-8?q?/9YHi4MrdY8J6p0dDT2tTjY1z5r2vMN3vDxrz2A=3D=3D?=","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"=?utf-8?q?UHF6tKAyq6euSgjQXgOVLGflcgxj?=\n\t=?utf-8?q?zFlrUwR7KaSkLe2RM/3fpQ+Xcq9VshI4YmTTg8KjKk4rRQnhrcwudbQASr/gqBlim?=\n\t=?utf-8?q?EXREomvdgACf7oLv/8Sn8ID9eeqWfo/gRuX2kkyQsX6tCbhCq0DyBO32zsgOJhEAY?=\n\t=?utf-8?q?aBbJuLVc7dcQMk7+yyijm/dW+cGuuqD8rqHgmMbCVXK96L+Pb3jqDuvjrT0aUyhYv?=\n\t=?utf-8?q?cW1KRH0SNW0/DVEpYSKi5OCRc6a2h5zZbXZjAOsFli9iWb4VM3CLwJsDmEhfOm7eJ?=\n\t=?utf-8?q?y6OHtRAA7pMMVDd5i3L+mTXAh5VdcH1KRxewsdkpAl64LSc/DQHbF1bCZUgfS7qsa?=\n\t=?utf-8?q?IkeyC0wrtbmCw7k9w2gagapPDRclPBR5q9xaK8LvuqiJ62nmhP5x7kXxsppM7NZNT?=\n\t=?utf-8?q?S9S90GVqjgKAY7cTbdJH3oLQ1KxGYZiv+sfi2WdMRIuYNT+IbiKKY1iDJHyvThi2B?=\n\t=?utf-8?q?6TDWPTxReg6lkyco3E7CeGVvxNf7Y+sKH3Hl+yjty+5OuC4jnz0KtvjXzybClSMES?=\n\t=?utf-8?q?kGyEecIAs66vXQ5vYjIVQy1sxUHawZu/gC/yP2jOYT3s0OFPKvAw3SG9Yed5pVjiE?=\n\t=?utf-8?q?UQc0q2Aa3mMLHqMzBNkYZN1MoSLp9nthgdDrY3mxrxGrmyY3+3T91zK/vk/0rFq0y?=\n\t=?utf-8?q?GYgHFQqwni/zpOgTZSqhKlTIh4Vxea3mYb2gE6qIxu5Gf2JRojSMF8q/wt+Y0L5Fx?=\n\t=?utf-8?q?/KVOnGlDqvaOY5E7CpLxc+sP1THPCFQsMOVhLgqXNzw3sG5fVrfO3pcGTncWMejAy?=\n\t=?utf-8?q?6XBpGGNtYj9MjStW4c3nCSlNrj9HH8aYSVz/efDV2bptLNn+WzcPMPLRgX+Ball4v?=\n\t=?utf-8?q?wjQQvw3D8Ky4rtvlSmviSxzSgoHCkVBoADKScQlwaCGrUuQW8CYmMkLknUQNBgABp?=\n\t=?utf-8?q?Ukd9iD9uCuDpgI4rdtGog708jlLL/Hhdthw1YjuEOoARLJFky3+Ou52aX5T8QP7x0?=\n\t=?utf-8?q?sTrh4QYLYKnafedaGMV/Jf4Erg7ePDxs5eRs6mjZezt4op6UgRjxAMgTOd0/wRPw+?=\n\t=?utf-8?q?DyJsHPL9Xc2tH9m+7pc9D1Rv4iC1BmMBDZcSuA538BR5YrQ55tWXHM6wQ7fHOKNaj?=\n\t=?utf-8?q?aCJBapySkeIUXC/ES399wQQTQeLta0HSNSDmHG+bZZ9I4fn3pPcy/65Q6qjFDuj9t?=\n\t=?utf-8?q?TFaC3ouTW+3uey66nJoECavEsuewYALV114q34jSbuJe5v1s+arqW1pCnnQJpKNC6?=\n\t=?utf-8?q?wtNpME26kZjUwvNxrmerfqB00PtLxE/WAPEqU5DT64hFgGisMVOLgMyAbUHlN3Iju?=\n\t=?utf-8?q?L8bRcaI0EIGSRvCrh4onoYMgC+3Oai6Og316wQq+g/ClOvuJYtiwngA+9/d+XJNGR?=\n\t=?utf-8?q?pCtxwHWET+2Kvdg?=","X-OriginatorOrg":"sct-15-20-9412-4-msonline-outlook-c3e7a.templateTenant","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n 1be47d08-fb62-474b-903f-08de91f9d366","X-MS-Exchange-CrossTenant-AuthSource":"SE3PR04MB8922.apcprd04.prod.outlook.com","X-MS-Exchange-CrossTenant-AuthAs":"Internal","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"04 Apr 2026 03:25:31.7445\n (UTC)","X-MS-Exchange-CrossTenant-FromEntityHeader":"Hosted","X-MS-Exchange-CrossTenant-Id":"84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa","X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg":"\n 00000000-0000-0000-0000-000000000000","X-MS-Exchange-Transport-CrossTenantHeadersStamped":"JH0PR04MB7622","X-CRM114-Version":"20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ","X-CRM114-CacheID":"sfid-20260403_202544_664971_85162F5D ","X-CRM114-Status":"GOOD (  20.12  )","X-Spam-Score":"-1.2 (-)","X-Spam-Report":"Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  On 4/3/2026 11:30 PM,\n > From: Fangyu Yu > > Gstage page-table\n    helpers frequently chase gstage->kvm->arch to > fetch pgd_levels. This\n adds\n    noise and repeats the same dereference > chain in hot pat [...]\n Content analysis details:   (-1.2 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -0.0 SPF_HELO_PASS          SPF: HELO matches SPF record\n -0.0 SPF_PASS               SPF: sender matches SPF record\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n                             [score: 0.0000]\n  0.9 FORGED_HOTMAIL_RCVD2   hotmail.com 'From' address, but no 'Received:'\n  0.0 FREEMAIL_FROM          Sender email is commonly abused enduser mail\n provider\n                             [nutty.liu(at)hotmail.com]","X-BeenThere":"kvm-riscv@lists.infradead.org","X-Mailman-Version":"2.1.34","Precedence":"list","List-Id":"<kvm-riscv.lists.infradead.org>","List-Unsubscribe":"<http://lists.infradead.org/mailman/options/kvm-riscv>,\n <mailto:kvm-riscv-request@lists.infradead.org?subject=unsubscribe>","List-Archive":"<http://lists.infradead.org/pipermail/kvm-riscv/>","List-Post":"<mailto:kvm-riscv@lists.infradead.org>","List-Help":"<mailto:kvm-riscv-request@lists.infradead.org?subject=help>","List-Subscribe":"<http://lists.infradead.org/mailman/listinfo/kvm-riscv>,\n <mailto:kvm-riscv-request@lists.infradead.org?subject=subscribe>","Content-Transfer-Encoding":"7bit","Content-Type":"text/plain; charset=\"us-ascii\"; Format=\"flowed\"","Sender":"\"kvm-riscv\" <kvm-riscv-bounces@lists.infradead.org>","Errors-To":"kvm-riscv-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"}}]