get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/1.0/patches/2196684/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2196684,
    "url": "http://patchwork.ozlabs.org/api/1.0/patches/2196684/?format=api",
    "project": {
        "id": 14,
        "url": "http://patchwork.ozlabs.org/api/1.0/projects/14/?format=api",
        "name": "QEMU Development",
        "link_name": "qemu-devel",
        "list_id": "qemu-devel.nongnu.org",
        "list_email": "qemu-devel@nongnu.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": ""
    },
    "msgid": "<20260216034432.23912-4-richard.henderson@linaro.org>",
    "date": "2026-02-16T03:44:22",
    "name": "[RFC,03/13] target/arm: Move kvm_arm_sve_get_vls within kvm.c",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "f98ed2bac7c607ed33d96e09e9f5fbe4a8dfb2fb",
    "submitter": {
        "id": 72104,
        "url": "http://patchwork.ozlabs.org/api/1.0/people/72104/?format=api",
        "name": "Richard Henderson",
        "email": "richard.henderson@linaro.org"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260216034432.23912-4-richard.henderson@linaro.org/mbox/",
    "series": [
        {
            "id": 492243,
            "url": "http://patchwork.ozlabs.org/api/1.0/series/492243/?format=api",
            "date": "2026-02-16T03:44:19",
            "name": "target/arm: Support SME for KVM",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/492243/mbox/"
        }
    ],
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2196684/checks/",
    "tags": {},
    "headers": {
        "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=linaro.org header.i=@linaro.org header.a=rsa-sha256\n header.s=google header.b=rgPFn0YQ;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fDpZd5n5Xz1xpl\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 16 Feb 2026 14:45:29 +1100 (AEDT)",
            "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1vrpXW-0002WT-10; Sun, 15 Feb 2026 22:44:50 -0500",
            "from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <richard.henderson@linaro.org>)\n id 1vrpXT-0002WB-QJ\n for qemu-devel@nongnu.org; Sun, 15 Feb 2026 22:44:47 -0500",
            "from mail-pl1-x635.google.com ([2607:f8b0:4864:20::635])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.90_1) (envelope-from <richard.henderson@linaro.org>)\n id 1vrpXS-0002Q1-3I\n for qemu-devel@nongnu.org; Sun, 15 Feb 2026 22:44:47 -0500",
            "by mail-pl1-x635.google.com with SMTP id\n d9443c01a7336-2aaf43014d0so19548055ad.2\n for <qemu-devel@nongnu.org>; Sun, 15 Feb 2026 19:44:45 -0800 (PST)",
            "from stoup.. ([2401:d002:dc0f:2100:4a1:428a:70f2:5844])\n by smtp.gmail.com with ESMTPSA id\n d9443c01a7336-2ad1aadca84sm53294155ad.70.2026.02.15.19.44.43\n for <qemu-devel@nongnu.org>\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Sun, 15 Feb 2026 19:44:44 -0800 (PST)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=linaro.org; s=google; t=1771213485; x=1771818285; darn=nongnu.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:to:from:from:to:cc:subject:date:message-id\n :reply-to; bh=i0CkMEqHWZZBF7b/EDsRH9ZprXMms0dNpE5IJYi11qg=;\n b=rgPFn0YQE/4g1NAjK/s8UMKGOwQZ9o01TYXuhcv+CZ4OFEPE3DNzfP5gITVIl577Xs\n 7zglWArlpHMTw3docllzI2o9sVob8i1UcCYxnhNVrjuq994tlCUZJmruwF2pIw/0TlT+\n j3f+A79lmJKbokItKew8L/tqQ6KHqwnsaNajd9CqEux4YYb8q3CQGmdq5+r4MNTl7509\n uwDSt7c0ybNdfAVDajkLCYg08M5VLWhbUIyCT3VyYURN46mDUKWyycYXLkK6czETPXzt\n ER4+wnvFCP4HC8qzC9hJ8J+UGoYPyIPDkZTD1EXZzvKtiPBf4kU/pF4wJ0rq7NiceAsB\n mBeQ==",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20230601; t=1771213485; x=1771818285;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to\n :cc:subject:date:message-id:reply-to;\n bh=i0CkMEqHWZZBF7b/EDsRH9ZprXMms0dNpE5IJYi11qg=;\n b=BijTVqMz11VxwXWCJ5V9+b+iR8xq3WKx8rD/fQdB2eg7TpWm9V2rDNd8pDFJZVFb2j\n 65SmOWjOW/kzKj6lXVojNNu1vyPg+eqX5XF8YN1jZ5nNv7JBuYvMhY66eXNhcWPO/UII\n tQcfxu+e+lx5WBQCvmJZOznP0Et7uF/Ubq2CqG9NSUsjoBvKHLtfVoIbDajBx6NIZ0Kf\n tMc4wVS4v7JHSev133jAPtbxP0yaoxVMCeDb0m32dYSLgiyiB0L+M3BrNHXSTruQkZdW\n 3o7jEvN4dcUcX7ekTTY+U8alnytZuC6ahPOyQKpupOl33LMLBvivhCSum4rPDruwnaWh\n hZsw==",
        "X-Gm-Message-State": "AOJu0YzlcjHCxrudRq4r438IX4j+EYUbsRyacBQ3W6O8QdyQF86j3+xb\n LIn7obC8c+8RE0xFfLvy0G+lURjtpI1lXo/67AkbGMiev8UUL/A1VfBnTveg5pXH9oRA38SR+5u\n kLKxQJ+Y=",
        "X-Gm-Gg": "AZuq6aImATcNd30SOWFM2PJ7kr9uY8f6RadZ9dFSbtAyBa+lrJxMiQBCdXOJylkCElI\n UnoZtmGy7hZItQ9Kk/12pFKgh21wEpJsiMhxWsj7TwN0KQMQPUx+Shv3B20H6BQMUnKVr+HEQZ6\n Uey2zkhWv1+tq4SqzkdX0G5HNVUYULRjMqm8ErHJdFa5aMkLTMR6s06TaLb9ZL2XjxCRm9gvxPo\n 2LdZx6K51mCKfeqi/LLXZ5TgYdY6RSV++Xum4uOgp7pDMr6hC9iYEpKVgN1o/JnXXddZ7yzC72T\n MFe0ylmp9A9IRSTt8LEpWGe1+YRsfGD6H1KirkwgZOMuR2bovDvn0TgdSn8TBxqjLYRk3U/gycl\n uBVjdKt8eUf/tn9qQV8iCY0u9/z45nXxbDBxXf6jy5A/VAX3f2mJcndPjViXTQCiY1fDvGGEzQG\n 351H4umW8xTTx//nZtkWuKmmGfh22qDIuT",
        "X-Received": "by 2002:a17:902:d48e:b0:2a9:2942:e15d with SMTP id\n d9443c01a7336-2ab4cf4f447mr115964305ad.5.1771213484686;\n Sun, 15 Feb 2026 19:44:44 -0800 (PST)",
        "From": "Richard Henderson <richard.henderson@linaro.org>",
        "To": "qemu-devel@nongnu.org",
        "Subject": "[RFC PATCH 03/13] target/arm: Move kvm_arm_sve_get_vls within kvm.c",
        "Date": "Mon, 16 Feb 2026 13:44:22 +1000",
        "Message-ID": "<20260216034432.23912-4-richard.henderson@linaro.org>",
        "X-Mailer": "git-send-email 2.43.0",
        "In-Reply-To": "<20260216034432.23912-1-richard.henderson@linaro.org>",
        "References": "<20260216034432.23912-1-richard.henderson@linaro.org>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "Received-SPF": "pass client-ip=2607:f8b0:4864:20::635;\n envelope-from=richard.henderson@linaro.org; helo=mail-pl1-x635.google.com",
        "X-Spam_score_int": "-20",
        "X-Spam_score": "-2.1",
        "X-Spam_bar": "--",
        "X-Spam_report": "(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=ham autolearn_force=no",
        "X-Spam_action": "no action",
        "X-BeenThere": "qemu-devel@nongnu.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "qemu development <qemu-devel.nongnu.org>",
        "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>",
        "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>",
        "List-Post": "<mailto:qemu-devel@nongnu.org>",
        "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>",
        "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>",
        "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org",
        "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"
    },
    "content": "Prepare to adjust the invocation point and visibility.\n\nSigned-off-by: Richard Henderson <richard.henderson@linaro.org>\n---\n target/arm/kvm.c | 108 +++++++++++++++++++++++------------------------\n 1 file changed, 54 insertions(+), 54 deletions(-)",
    "diff": "diff --git a/target/arm/kvm.c b/target/arm/kvm.c\nindex ded582e0da..e0fd79b78c 100644\n--- a/target/arm/kvm.c\n+++ b/target/arm/kvm.c\n@@ -243,6 +243,60 @@ static int get_host_cpu_reg(int fd, ARMHostCPUFeatures *ahcf,\n     return ret;\n }\n \n+uint32_t kvm_arm_sve_get_vls(ARMCPU *cpu)\n+{\n+    /* Only call this function if kvm_arm_sve_supported() returns true. */\n+    static uint64_t vls[KVM_ARM64_SVE_VLS_WORDS];\n+    static bool probed;\n+    uint32_t vq = 0;\n+    int i;\n+\n+    /*\n+     * KVM ensures all host CPUs support the same set of vector lengths.\n+     * So we only need to create the scratch VCPUs once and then cache\n+     * the results.\n+     */\n+    if (!probed) {\n+        struct kvm_vcpu_init init = {\n+            .target = -1,\n+            .features[0] = (1 << KVM_ARM_VCPU_SVE),\n+        };\n+        struct kvm_one_reg reg = {\n+            .id = KVM_REG_ARM64_SVE_VLS,\n+            .addr = (uint64_t)&vls[0],\n+        };\n+        int fdarray[3], ret;\n+\n+        probed = true;\n+\n+        if (!kvm_arm_create_scratch_host_vcpu(fdarray, &init)) {\n+            error_report(\"failed to create scratch VCPU with SVE enabled\");\n+            abort();\n+        }\n+        ret = ioctl(fdarray[2], KVM_GET_ONE_REG, &reg);\n+        kvm_arm_destroy_scratch_host_vcpu(fdarray);\n+        if (ret) {\n+            error_report(\"failed to get KVM_REG_ARM64_SVE_VLS: %s\",\n+                         strerror(errno));\n+            abort();\n+        }\n+\n+        for (i = KVM_ARM64_SVE_VLS_WORDS - 1; i >= 0; --i) {\n+            if (vls[i]) {\n+                vq = 64 - clz64(vls[i]) + i * 64;\n+                break;\n+            }\n+        }\n+        if (vq > ARM_MAX_VQ) {\n+            warn_report(\"KVM supports vector lengths larger than \"\n+                        \"QEMU can enable\");\n+            vls[0] &= MAKE_64BIT_MASK(0, ARM_MAX_VQ);\n+        }\n+    }\n+\n+    return vls[0];\n+}\n+\n static bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)\n {\n     /* Identify the feature bits corresponding to the host CPU, and\n@@ -1886,60 +1940,6 @@ bool kvm_arm_mte_supported(void)\n \n QEMU_BUILD_BUG_ON(KVM_ARM64_SVE_VQ_MIN != 1);\n \n-uint32_t kvm_arm_sve_get_vls(ARMCPU *cpu)\n-{\n-    /* Only call this function if kvm_arm_sve_supported() returns true. */\n-    static uint64_t vls[KVM_ARM64_SVE_VLS_WORDS];\n-    static bool probed;\n-    uint32_t vq = 0;\n-    int i;\n-\n-    /*\n-     * KVM ensures all host CPUs support the same set of vector lengths.\n-     * So we only need to create the scratch VCPUs once and then cache\n-     * the results.\n-     */\n-    if (!probed) {\n-        struct kvm_vcpu_init init = {\n-            .target = -1,\n-            .features[0] = (1 << KVM_ARM_VCPU_SVE),\n-        };\n-        struct kvm_one_reg reg = {\n-            .id = KVM_REG_ARM64_SVE_VLS,\n-            .addr = (uint64_t)&vls[0],\n-        };\n-        int fdarray[3], ret;\n-\n-        probed = true;\n-\n-        if (!kvm_arm_create_scratch_host_vcpu(fdarray, &init)) {\n-            error_report(\"failed to create scratch VCPU with SVE enabled\");\n-            abort();\n-        }\n-        ret = ioctl(fdarray[2], KVM_GET_ONE_REG, &reg);\n-        kvm_arm_destroy_scratch_host_vcpu(fdarray);\n-        if (ret) {\n-            error_report(\"failed to get KVM_REG_ARM64_SVE_VLS: %s\",\n-                         strerror(errno));\n-            abort();\n-        }\n-\n-        for (i = KVM_ARM64_SVE_VLS_WORDS - 1; i >= 0; --i) {\n-            if (vls[i]) {\n-                vq = 64 - clz64(vls[i]) + i * 64;\n-                break;\n-            }\n-        }\n-        if (vq > ARM_MAX_VQ) {\n-            warn_report(\"KVM supports vector lengths larger than \"\n-                        \"QEMU can enable\");\n-            vls[0] &= MAKE_64BIT_MASK(0, ARM_MAX_VQ);\n-        }\n-    }\n-\n-    return vls[0];\n-}\n-\n static int kvm_arm_sve_set_vls(ARMCPU *cpu)\n {\n     uint64_t vls[KVM_ARM64_SVE_VLS_WORDS] = { cpu->sve_vq.map };\n",
    "prefixes": [
        "RFC",
        "03/13"
    ]
}