Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.0/patches/2196686/?format=api
{ "id": 2196686, "url": "http://patchwork.ozlabs.org/api/1.0/patches/2196686/?format=api", "project": { "id": 14, "url": "http://patchwork.ozlabs.org/api/1.0/projects/14/?format=api", "name": "QEMU Development", "link_name": "qemu-devel", "list_id": "qemu-devel.nongnu.org", "list_email": "qemu-devel@nongnu.org", "web_url": "", "scm_url": "", "webscm_url": "" }, "msgid": "<20260216034432.23912-5-richard.henderson@linaro.org>", "date": "2026-02-16T03:44:23", "name": "[RFC,04/13] target/arm: Init sve_vq in kvm_arm_set_cpu_features_from_host", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "74223d95eaa2807cb9f4ffba51da6017c249fc85", "submitter": { "id": 72104, "url": "http://patchwork.ozlabs.org/api/1.0/people/72104/?format=api", "name": "Richard Henderson", "email": "richard.henderson@linaro.org" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260216034432.23912-5-richard.henderson@linaro.org/mbox/", "series": [ { "id": 492243, "url": "http://patchwork.ozlabs.org/api/1.0/series/492243/?format=api", "date": "2026-02-16T03:44:19", "name": "target/arm: Support SME for KVM", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/492243/mbox/" } ], "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2196686/checks/", "tags": {}, "headers": { "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=linaro.org header.i=@linaro.org header.a=rsa-sha256\n header.s=google header.b=Rjh+Dpr8;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fDpZy39zPz1xpl\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 16 Feb 2026 14:45:46 +1100 (AEDT)", "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1vrpXX-0002Ws-R9; Sun, 15 Feb 2026 22:44:51 -0500", "from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <richard.henderson@linaro.org>)\n id 1vrpXV-0002WS-QD\n for qemu-devel@nongnu.org; Sun, 15 Feb 2026 22:44:49 -0500", "from mail-pg1-x530.google.com ([2607:f8b0:4864:20::530])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.90_1) (envelope-from <richard.henderson@linaro.org>)\n id 1vrpXU-0002QG-63\n for qemu-devel@nongnu.org; Sun, 15 Feb 2026 22:44:49 -0500", "by mail-pg1-x530.google.com with SMTP id\n 41be03b00d2f7-c6e2355739dso975953a12.2\n for <qemu-devel@nongnu.org>; Sun, 15 Feb 2026 19:44:47 -0800 (PST)", "from stoup.. ([2401:d002:dc0f:2100:4a1:428a:70f2:5844])\n by smtp.gmail.com with ESMTPSA id\n d9443c01a7336-2ad1aadca84sm53294155ad.70.2026.02.15.19.44.45\n for <qemu-devel@nongnu.org>\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Sun, 15 Feb 2026 19:44:46 -0800 (PST)" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=linaro.org; s=google; t=1771213487; x=1771818287; darn=nongnu.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:to:from:from:to:cc:subject:date:message-id\n :reply-to; bh=g6TjkzWZADwtaXnuXxdFy8Vh9RUDwBaNaugNOdAFub8=;\n b=Rjh+Dpr827niZqEAfAAWOFOQoiE1m4wHnpnAqyoGsy8i6hauSawb5MUnN5QdEXAfOj\n uw6A7fZzmz+akPEVNgT77XyQ1jFWcm+YZ85HVjp36Stczl//qF5+GtusGyDvNSPQ0AsY\n c7XrcQ+rhKCLLvh4EhKOwTvgmZ0ML3AuelpYZtsFeLlaPtsk3mekoAMaSmjfoMwr32XC\n 9bcHvUOtCHV8znPBKT3wNpydMjnpPcfohhJbOdpx5L8WDYzKLracddPhvwAV+1j5Mgyv\n pAtZ1GJINxbZ/3NhDjLAb2iZO5yOpSPeAueZKtrL8ANiWCUhEcaPt+XIYepiW0OYmXNo\n 4VKA==", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20230601; t=1771213487; x=1771818287;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to\n :cc:subject:date:message-id:reply-to;\n bh=g6TjkzWZADwtaXnuXxdFy8Vh9RUDwBaNaugNOdAFub8=;\n b=aDLpWSAyGPGHqgXj6BgT75LwMSv9Bvn21sJQNb+UOsxv3z0RU/5xhNOFbLXaWpL57W\n NsLLrGvDPS0bxjIw9XOfymG8AXVgewpx1olz5Ia9EQ2Jgi8PArn+K9RWI1EMOrxNLtCC\n dFuYyyf6wAvMqaj8UDJtt/RvqVaM/3WA0+sPAl7GYoy9gx2uV8xPMU0B9g7FsH9VSeDX\n nTIbzGO9mhIFQ+71L8nJsVlHutjhMJOoCAjeanzkhp89bZZy7pUOrp7pKmnUKdrjQi5s\n rVQTbD3bjNYVYlBbGZpnpvd0JO94oIJyTxaiqzcLGCipdSGIK3s+6vreb2YTj7IUXt+D\n +9yg==", "X-Gm-Message-State": "AOJu0YxuqnFwr9sdpmDcL0Tcy6307kVcDwroykwIkVZCKJJbIf2MOVFP\n O13ANzUk7x+oVARwMl3SBwAn+30ceCw5+0iWANrHddiH3n2xsSVmCIeCpG1hXmuD4UZM99q2LWQ\n QLtkCgu8=", "X-Gm-Gg": "AZuq6aJmy6BO11AyamC0HLlZYPDjSfsQJEv+8e3QlSvK+i95qXy5zn+DE/OUgo5ubOW\n XlTzQiUa4tOVUnV1jRx7WnNnEqLHck/2CEZY+bIZsa/c2PgRHDzAOlOsIyq/DGg7tWEK43k0jmk\n amJ+zRJ91oOSw9talzcXdVFvCraLg/5XDnoGcetalzAKmvId/GNCnxYocJdzC5PcI0g5grmV51A\n V1mQxaX3Sa+P/OtQLYePW2ucdJFOkLQQBYb+Y8s1mjPyBVSdqNM2cXP1/sDpZq/ZcwNndaIiCGf\n XN2CcXJDXH1q9Ajjq64lqbVpU4YfZb6Vm7BhQVNaYglS3m91gyKXjFWioRROlcg7A8iNhpul5qE\n TIdvJSJZR1ClZhdLHbq1iV75EXjmApSeUPXbVxxgbLbzMfRIpHSHOcPyNEAC/bTZUnJOtr/B0JK\n svmmRjKFq+WiU8c32mvcHUo8G1a9iqQas3", "X-Received": "by 2002:a05:6a21:114c:b0:350:b8e:f99b with SMTP id\n adf61e73a8af0-3946c87fdb4mr8336596637.45.1771213486610;\n Sun, 15 Feb 2026 19:44:46 -0800 (PST)", "From": "Richard Henderson <richard.henderson@linaro.org>", "To": "qemu-devel@nongnu.org", "Subject": "[RFC PATCH 04/13] target/arm: Init sve_vq in\n kvm_arm_set_cpu_features_from_host", "Date": "Mon, 16 Feb 2026 13:44:23 +1000", "Message-ID": "<20260216034432.23912-5-richard.henderson@linaro.org>", "X-Mailer": "git-send-email 2.43.0", "In-Reply-To": "<20260216034432.23912-1-richard.henderson@linaro.org>", "References": "<20260216034432.23912-1-richard.henderson@linaro.org>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "Received-SPF": "pass client-ip=2607:f8b0:4864:20::530;\n envelope-from=richard.henderson@linaro.org; helo=mail-pg1-x530.google.com", "X-Spam_score_int": "-20", "X-Spam_score": "-2.1", "X-Spam_bar": "--", "X-Spam_report": "(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=ham autolearn_force=no", "X-Spam_action": "no action", "X-BeenThere": "qemu-devel@nongnu.org", "X-Mailman-Version": "2.1.29", "Precedence": "list", "List-Id": "qemu development <qemu-devel.nongnu.org>", "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>", "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>", "List-Post": "<mailto:qemu-devel@nongnu.org>", "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>", "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>", "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org", "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org" }, "content": "Probe for SVE vector sizes with the same scratch vm that\nwe use for probing other features. Remove a separate\ninitialization path in arm_cpu_sve_finalize.\nUnexport kvm_arm_sve_get_vls.\n\nSigned-off-by: Richard Henderson <richard.henderson@linaro.org>\n---\n target/arm/kvm_arm.h | 10 ------\n target/arm/cpu64.c | 20 +-----------\n target/arm/kvm-stub.c | 5 ---\n target/arm/kvm.c | 73 ++++++++++++++++---------------------------\n 4 files changed, 28 insertions(+), 80 deletions(-)", "diff": "diff --git a/target/arm/kvm_arm.h b/target/arm/kvm_arm.h\nindex cc0b374254..97549766ea 100644\n--- a/target/arm/kvm_arm.h\n+++ b/target/arm/kvm_arm.h\n@@ -124,16 +124,6 @@ bool kvm_arm_create_scratch_host_vcpu(int *fdarray,\n */\n void kvm_arm_destroy_scratch_host_vcpu(int *fdarray);\n \n-/**\n- * kvm_arm_sve_get_vls:\n- * @cpu: ARMCPU\n- *\n- * Get all the SVE vector lengths supported by the KVM host, setting\n- * the bits corresponding to their length in quadwords minus one\n- * (vq - 1) up to ARM_MAX_VQ. Return the resulting map.\n- */\n-uint32_t kvm_arm_sve_get_vls(ARMCPU *cpu);\n-\n /**\n * kvm_arm_set_cpu_features_from_host:\n * @cpu: ARMCPU to set the features for\ndiff --git a/target/arm/cpu64.c b/target/arm/cpu64.c\nindex 10c6796548..0116b6cc88 100644\n--- a/target/arm/cpu64.c\n+++ b/target/arm/cpu64.c\n@@ -79,28 +79,10 @@ void arm_cpu_sve_finalize(ARMCPU *cpu, Error **errp)\n */\n uint32_t vq_map = cpu->sve_vq.map;\n uint32_t vq_init = cpu->sve_vq.init;\n- uint32_t vq_supported;\n+ uint32_t vq_supported = cpu->sve_vq.supported;\n uint32_t vq_mask = 0;\n uint32_t tmp, vq, max_vq = 0;\n \n- /*\n- * CPU models specify a set of supported vector lengths which are\n- * enabled by default. Attempting to enable any vector length not set\n- * in the supported bitmap results in an error. When KVM is enabled we\n- * fetch the supported bitmap from the host.\n- */\n- if (kvm_enabled()) {\n- if (kvm_arm_sve_supported()) {\n- cpu->sve_vq.supported = kvm_arm_sve_get_vls(cpu);\n- vq_supported = cpu->sve_vq.supported;\n- } else {\n- assert(!cpu_isar_feature(aa64_sve, cpu));\n- vq_supported = 0;\n- }\n- } else {\n- vq_supported = cpu->sve_vq.supported;\n- }\n-\n /*\n * Process explicit sve<N> properties.\n * From the properties, sve_vq_map<N> implies sve_vq_init<N>.\ndiff --git a/target/arm/kvm-stub.c b/target/arm/kvm-stub.c\nindex ea67deea52..f2de36aef3 100644\n--- a/target/arm/kvm-stub.c\n+++ b/target/arm/kvm-stub.c\n@@ -95,11 +95,6 @@ void kvm_arm_steal_time_finalize(ARMCPU *cpu, Error **errp)\n g_assert_not_reached();\n }\n \n-uint32_t kvm_arm_sve_get_vls(ARMCPU *cpu)\n-{\n- g_assert_not_reached();\n-}\n-\n void kvm_arm_enable_mte(Object *cpuobj, Error **errp)\n {\n g_assert_not_reached();\ndiff --git a/target/arm/kvm.c b/target/arm/kvm.c\nindex e0fd79b78c..464356989b 100644\n--- a/target/arm/kvm.c\n+++ b/target/arm/kvm.c\n@@ -60,6 +60,7 @@ typedef struct ARMHostCPUFeatures {\n ARMISARegisters isar;\n uint64_t features;\n uint32_t target;\n+ uint32_t sve_vq_supported;\n const char *dtb_compatible;\n } ARMHostCPUFeatures;\n \n@@ -243,58 +244,34 @@ static int get_host_cpu_reg(int fd, ARMHostCPUFeatures *ahcf,\n return ret;\n }\n \n-uint32_t kvm_arm_sve_get_vls(ARMCPU *cpu)\n+static uint32_t kvm_arm_sve_get_vls(int fd)\n {\n /* Only call this function if kvm_arm_sve_supported() returns true. */\n- static uint64_t vls[KVM_ARM64_SVE_VLS_WORDS];\n- static bool probed;\n+ uint64_t vls[KVM_ARM64_SVE_VLS_WORDS];\n+ struct kvm_one_reg reg = {\n+ .id = KVM_REG_ARM64_SVE_VLS,\n+ .addr = (uint64_t)&vls[0],\n+ };\n uint32_t vq = 0;\n- int i;\n+ int ret;\n \n- /*\n- * KVM ensures all host CPUs support the same set of vector lengths.\n- * So we only need to create the scratch VCPUs once and then cache\n- * the results.\n- */\n- if (!probed) {\n- struct kvm_vcpu_init init = {\n- .target = -1,\n- .features[0] = (1 << KVM_ARM_VCPU_SVE),\n- };\n- struct kvm_one_reg reg = {\n- .id = KVM_REG_ARM64_SVE_VLS,\n- .addr = (uint64_t)&vls[0],\n- };\n- int fdarray[3], ret;\n-\n- probed = true;\n-\n- if (!kvm_arm_create_scratch_host_vcpu(fdarray, &init)) {\n- error_report(\"failed to create scratch VCPU with SVE enabled\");\n- abort();\n- }\n- ret = ioctl(fdarray[2], KVM_GET_ONE_REG, ®);\n- kvm_arm_destroy_scratch_host_vcpu(fdarray);\n- if (ret) {\n- error_report(\"failed to get KVM_REG_ARM64_SVE_VLS: %s\",\n- strerror(errno));\n- abort();\n- }\n-\n- for (i = KVM_ARM64_SVE_VLS_WORDS - 1; i >= 0; --i) {\n- if (vls[i]) {\n- vq = 64 - clz64(vls[i]) + i * 64;\n- break;\n- }\n- }\n- if (vq > ARM_MAX_VQ) {\n- warn_report(\"KVM supports vector lengths larger than \"\n- \"QEMU can enable\");\n- vls[0] &= MAKE_64BIT_MASK(0, ARM_MAX_VQ);\n- }\n+ ret = ioctl(fd, KVM_GET_ONE_REG, ®);\n+ if (ret) {\n+ error_report(\"failed to get KVM_REG_ARM64_SVE_VLS: %s\",\n+ strerror(errno));\n+ abort();\n }\n \n- return vls[0];\n+ for (int i = KVM_ARM64_SVE_VLS_WORDS - 1; i >= 0; --i) {\n+ if (vls[i]) {\n+ vq = 64 - clz64(vls[i]) + i * 64;\n+ break;\n+ }\n+ }\n+ if (vq > ARM_MAX_VQ) {\n+ warn_report(\"KVM supports vector lengths larger than QEMU can enable\");\n+ }\n+ return vls[0] & MAKE_64BIT_MASK(0, ARM_MAX_VQ);\n }\n \n static bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)\n@@ -469,6 +446,9 @@ static bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)\n * So only read the register if we set KVM_ARM_VCPU_SVE above.\n */\n err |= get_host_cpu_reg(fd, ahcf, ID_AA64ZFR0_EL1_IDX);\n+\n+ /* Read the set of supported vector lengths. */\n+ arm_host_cpu_features.sve_vq_supported = kvm_arm_sve_get_vls(fd);\n }\n }\n \n@@ -516,6 +496,7 @@ void kvm_arm_set_cpu_features_from_host(ARMCPU *cpu)\n cpu->kvm_target = arm_host_cpu_features.target;\n cpu->dtb_compatible = arm_host_cpu_features.dtb_compatible;\n cpu->isar = arm_host_cpu_features.isar;\n+ cpu->sve_vq.supported = arm_host_cpu_features.sve_vq_supported;\n env->features = arm_host_cpu_features.features;\n }\n \n", "prefixes": [ "RFC", "04/13" ] }