{"id":2196684,"url":"http://patchwork.ozlabs.org/api/1.0/patches/2196684/?format=json","project":{"id":14,"url":"http://patchwork.ozlabs.org/api/1.0/projects/14/?format=json","name":"QEMU Development","link_name":"qemu-devel","list_id":"qemu-devel.nongnu.org","list_email":"qemu-devel@nongnu.org","web_url":"","scm_url":"","webscm_url":""},"msgid":"<20260216034432.23912-4-richard.henderson@linaro.org>","date":"2026-02-16T03:44:22","name":"[RFC,03/13] target/arm: Move kvm_arm_sve_get_vls within kvm.c","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"f98ed2bac7c607ed33d96e09e9f5fbe4a8dfb2fb","submitter":{"id":72104,"url":"http://patchwork.ozlabs.org/api/1.0/people/72104/?format=json","name":"Richard Henderson","email":"richard.henderson@linaro.org"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/qemu-devel/patch/20260216034432.23912-4-richard.henderson@linaro.org/mbox/","series":[{"id":492243,"url":"http://patchwork.ozlabs.org/api/1.0/series/492243/?format=json","date":"2026-02-16T03:44:19","name":"target/arm: Support SME for KVM","version":1,"mbox":"http://patchwork.ozlabs.org/series/492243/mbox/"}],"check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2196684/checks/","tags":{},"headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=linaro.org header.i=@linaro.org header.a=rsa-sha256\n header.s=google header.b=rgPFn0YQ;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fDpZd5n5Xz1xpl\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 16 Feb 2026 14:45:29 +1100 (AEDT)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1vrpXW-0002WT-10; Sun, 15 Feb 2026 22:44:50 -0500","from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <richard.henderson@linaro.org>)\n id 1vrpXT-0002WB-QJ\n for qemu-devel@nongnu.org; Sun, 15 Feb 2026 22:44:47 -0500","from mail-pl1-x635.google.com ([2607:f8b0:4864:20::635])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.90_1) (envelope-from <richard.henderson@linaro.org>)\n id 1vrpXS-0002Q1-3I\n for qemu-devel@nongnu.org; Sun, 15 Feb 2026 22:44:47 -0500","by mail-pl1-x635.google.com with SMTP id\n d9443c01a7336-2aaf43014d0so19548055ad.2\n for <qemu-devel@nongnu.org>; Sun, 15 Feb 2026 19:44:45 -0800 (PST)","from stoup.. ([2401:d002:dc0f:2100:4a1:428a:70f2:5844])\n by smtp.gmail.com with ESMTPSA id\n d9443c01a7336-2ad1aadca84sm53294155ad.70.2026.02.15.19.44.43\n for <qemu-devel@nongnu.org>\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Sun, 15 Feb 2026 19:44:44 -0800 (PST)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=linaro.org; s=google; t=1771213485; x=1771818285; darn=nongnu.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:to:from:from:to:cc:subject:date:message-id\n :reply-to; bh=i0CkMEqHWZZBF7b/EDsRH9ZprXMms0dNpE5IJYi11qg=;\n b=rgPFn0YQE/4g1NAjK/s8UMKGOwQZ9o01TYXuhcv+CZ4OFEPE3DNzfP5gITVIl577Xs\n 7zglWArlpHMTw3docllzI2o9sVob8i1UcCYxnhNVrjuq994tlCUZJmruwF2pIw/0TlT+\n j3f+A79lmJKbokItKew8L/tqQ6KHqwnsaNajd9CqEux4YYb8q3CQGmdq5+r4MNTl7509\n uwDSt7c0ybNdfAVDajkLCYg08M5VLWhbUIyCT3VyYURN46mDUKWyycYXLkK6czETPXzt\n ER4+wnvFCP4HC8qzC9hJ8J+UGoYPyIPDkZTD1EXZzvKtiPBf4kU/pF4wJ0rq7NiceAsB\n mBeQ==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20230601; t=1771213485; x=1771818285;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to\n :cc:subject:date:message-id:reply-to;\n bh=i0CkMEqHWZZBF7b/EDsRH9ZprXMms0dNpE5IJYi11qg=;\n b=BijTVqMz11VxwXWCJ5V9+b+iR8xq3WKx8rD/fQdB2eg7TpWm9V2rDNd8pDFJZVFb2j\n 65SmOWjOW/kzKj6lXVojNNu1vyPg+eqX5XF8YN1jZ5nNv7JBuYvMhY66eXNhcWPO/UII\n tQcfxu+e+lx5WBQCvmJZOznP0Et7uF/Ubq2CqG9NSUsjoBvKHLtfVoIbDajBx6NIZ0Kf\n tMc4wVS4v7JHSev133jAPtbxP0yaoxVMCeDb0m32dYSLgiyiB0L+M3BrNHXSTruQkZdW\n 3o7jEvN4dcUcX7ekTTY+U8alnytZuC6ahPOyQKpupOl33LMLBvivhCSum4rPDruwnaWh\n hZsw==","X-Gm-Message-State":"AOJu0YzlcjHCxrudRq4r438IX4j+EYUbsRyacBQ3W6O8QdyQF86j3+xb\n LIn7obC8c+8RE0xFfLvy0G+lURjtpI1lXo/67AkbGMiev8UUL/A1VfBnTveg5pXH9oRA38SR+5u\n kLKxQJ+Y=","X-Gm-Gg":"AZuq6aImATcNd30SOWFM2PJ7kr9uY8f6RadZ9dFSbtAyBa+lrJxMiQBCdXOJylkCElI\n UnoZtmGy7hZItQ9Kk/12pFKgh21wEpJsiMhxWsj7TwN0KQMQPUx+Shv3B20H6BQMUnKVr+HEQZ6\n Uey2zkhWv1+tq4SqzkdX0G5HNVUYULRjMqm8ErHJdFa5aMkLTMR6s06TaLb9ZL2XjxCRm9gvxPo\n 2LdZx6K51mCKfeqi/LLXZ5TgYdY6RSV++Xum4uOgp7pDMr6hC9iYEpKVgN1o/JnXXddZ7yzC72T\n MFe0ylmp9A9IRSTt8LEpWGe1+YRsfGD6H1KirkwgZOMuR2bovDvn0TgdSn8TBxqjLYRk3U/gycl\n uBVjdKt8eUf/tn9qQV8iCY0u9/z45nXxbDBxXf6jy5A/VAX3f2mJcndPjViXTQCiY1fDvGGEzQG\n 351H4umW8xTTx//nZtkWuKmmGfh22qDIuT","X-Received":"by 2002:a17:902:d48e:b0:2a9:2942:e15d with SMTP id\n d9443c01a7336-2ab4cf4f447mr115964305ad.5.1771213484686;\n Sun, 15 Feb 2026 19:44:44 -0800 (PST)","From":"Richard Henderson <richard.henderson@linaro.org>","To":"qemu-devel@nongnu.org","Subject":"[RFC PATCH 03/13] target/arm: Move kvm_arm_sve_get_vls within kvm.c","Date":"Mon, 16 Feb 2026 13:44:22 +1000","Message-ID":"<20260216034432.23912-4-richard.henderson@linaro.org>","X-Mailer":"git-send-email 2.43.0","In-Reply-To":"<20260216034432.23912-1-richard.henderson@linaro.org>","References":"<20260216034432.23912-1-richard.henderson@linaro.org>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","Received-SPF":"pass client-ip=2607:f8b0:4864:20::635;\n envelope-from=richard.henderson@linaro.org; helo=mail-pl1-x635.google.com","X-Spam_score_int":"-20","X-Spam_score":"-2.1","X-Spam_bar":"--","X-Spam_report":"(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=ham autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"},"content":"Prepare to adjust the invocation point and visibility.\n\nSigned-off-by: Richard Henderson <richard.henderson@linaro.org>\n---\n target/arm/kvm.c | 108 +++++++++++++++++++++++------------------------\n 1 file changed, 54 insertions(+), 54 deletions(-)","diff":"diff --git a/target/arm/kvm.c b/target/arm/kvm.c\nindex ded582e0da..e0fd79b78c 100644\n--- a/target/arm/kvm.c\n+++ b/target/arm/kvm.c\n@@ -243,6 +243,60 @@ static int get_host_cpu_reg(int fd, ARMHostCPUFeatures *ahcf,\n     return ret;\n }\n \n+uint32_t kvm_arm_sve_get_vls(ARMCPU *cpu)\n+{\n+    /* Only call this function if kvm_arm_sve_supported() returns true. */\n+    static uint64_t vls[KVM_ARM64_SVE_VLS_WORDS];\n+    static bool probed;\n+    uint32_t vq = 0;\n+    int i;\n+\n+    /*\n+     * KVM ensures all host CPUs support the same set of vector lengths.\n+     * So we only need to create the scratch VCPUs once and then cache\n+     * the results.\n+     */\n+    if (!probed) {\n+        struct kvm_vcpu_init init = {\n+            .target = -1,\n+            .features[0] = (1 << KVM_ARM_VCPU_SVE),\n+        };\n+        struct kvm_one_reg reg = {\n+            .id = KVM_REG_ARM64_SVE_VLS,\n+            .addr = (uint64_t)&vls[0],\n+        };\n+        int fdarray[3], ret;\n+\n+        probed = true;\n+\n+        if (!kvm_arm_create_scratch_host_vcpu(fdarray, &init)) {\n+            error_report(\"failed to create scratch VCPU with SVE enabled\");\n+            abort();\n+        }\n+        ret = ioctl(fdarray[2], KVM_GET_ONE_REG, &reg);\n+        kvm_arm_destroy_scratch_host_vcpu(fdarray);\n+        if (ret) {\n+            error_report(\"failed to get KVM_REG_ARM64_SVE_VLS: %s\",\n+                         strerror(errno));\n+            abort();\n+        }\n+\n+        for (i = KVM_ARM64_SVE_VLS_WORDS - 1; i >= 0; --i) {\n+            if (vls[i]) {\n+                vq = 64 - clz64(vls[i]) + i * 64;\n+                break;\n+            }\n+        }\n+        if (vq > ARM_MAX_VQ) {\n+            warn_report(\"KVM supports vector lengths larger than \"\n+                        \"QEMU can enable\");\n+            vls[0] &= MAKE_64BIT_MASK(0, ARM_MAX_VQ);\n+        }\n+    }\n+\n+    return vls[0];\n+}\n+\n static bool kvm_arm_get_host_cpu_features(ARMHostCPUFeatures *ahcf)\n {\n     /* Identify the feature bits corresponding to the host CPU, and\n@@ -1886,60 +1940,6 @@ bool kvm_arm_mte_supported(void)\n \n QEMU_BUILD_BUG_ON(KVM_ARM64_SVE_VQ_MIN != 1);\n \n-uint32_t kvm_arm_sve_get_vls(ARMCPU *cpu)\n-{\n-    /* Only call this function if kvm_arm_sve_supported() returns true. */\n-    static uint64_t vls[KVM_ARM64_SVE_VLS_WORDS];\n-    static bool probed;\n-    uint32_t vq = 0;\n-    int i;\n-\n-    /*\n-     * KVM ensures all host CPUs support the same set of vector lengths.\n-     * So we only need to create the scratch VCPUs once and then cache\n-     * the results.\n-     */\n-    if (!probed) {\n-        struct kvm_vcpu_init init = {\n-            .target = -1,\n-            .features[0] = (1 << KVM_ARM_VCPU_SVE),\n-        };\n-        struct kvm_one_reg reg = {\n-            .id = KVM_REG_ARM64_SVE_VLS,\n-            .addr = (uint64_t)&vls[0],\n-        };\n-        int fdarray[3], ret;\n-\n-        probed = true;\n-\n-        if (!kvm_arm_create_scratch_host_vcpu(fdarray, &init)) {\n-            error_report(\"failed to create scratch VCPU with SVE enabled\");\n-            abort();\n-        }\n-        ret = ioctl(fdarray[2], KVM_GET_ONE_REG, &reg);\n-        kvm_arm_destroy_scratch_host_vcpu(fdarray);\n-        if (ret) {\n-            error_report(\"failed to get KVM_REG_ARM64_SVE_VLS: %s\",\n-                         strerror(errno));\n-            abort();\n-        }\n-\n-        for (i = KVM_ARM64_SVE_VLS_WORDS - 1; i >= 0; --i) {\n-            if (vls[i]) {\n-                vq = 64 - clz64(vls[i]) + i * 64;\n-                break;\n-            }\n-        }\n-        if (vq > ARM_MAX_VQ) {\n-            warn_report(\"KVM supports vector lengths larger than \"\n-                        \"QEMU can enable\");\n-            vls[0] &= MAKE_64BIT_MASK(0, ARM_MAX_VQ);\n-        }\n-    }\n-\n-    return vls[0];\n-}\n-\n static int kvm_arm_sve_set_vls(ARMCPU *cpu)\n {\n     uint64_t vls[KVM_ARM64_SVE_VLS_WORDS] = { cpu->sve_vq.map };\n","prefixes":["RFC","03/13"]}