From: Marc Zyngier <maz@kernel.org>
To: Mark Brown <broonie@kernel.org>
Cc: Oliver Upton <oliver.upton@linux.dev>,
Joey Gouly <joey.gouly@arm.com>,
Catalin Marinas <catalin.marinas@arm.com>,
Suzuki K Poulose <suzuki.poulose@arm.com>,
Will Deacon <will@kernel.org>,
Paolo Bonzini <pbonzini@redhat.com>,
Jonathan Corbet <corbet@lwn.net>, Shuah Khan <shuah@kernel.org>,
Dave Martin <Dave.Martin@arm.com>, Fuad Tabba <tabba@google.com>,
Mark Rutland <mark.rutland@arm.com>,
linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev,
linux-kernel@vger.kernel.org, kvm@vger.kernel.org,
linux-doc@vger.kernel.org, linux-kselftest@vger.kernel.org
Subject: Re: [PATCH v7 00/29] KVM: arm64: Implement support for SME
Date: Mon, 01 Sep 2025 13:44:04 +0100 [thread overview]
Message-ID: <861poqe417.wl-maz@kernel.org> (raw)
In-Reply-To: <20250822-kvm-arm64-sme-v7-0-7a65d82b8b10@kernel.org>
On Fri, 22 Aug 2025 02:53:29 +0100,
Mark Brown <broonie@kernel.org> wrote:
>
> I've removed the RFC tag from this version of the series, but the items
> that I'm looking for feedback on remains the same:
>
> - The userspace ABI, in particular:
> - The vector length used for the SVE registers, access to the SVE
> registers and access to ZA and (if available) ZT0 depending on
> the current state of PSTATE.{SM,ZA}.
> - The use of a single finalisation for both SVE and SME.
How about Cc'ing the QEMU folks? They are the ones consuming these
APIs. Peter Maydell and Eric Auger spring to mind as potential
targets.
M.
--
Without deviation from the norm, progress is not possible.
prev parent reply other threads:[~2025-09-01 12:44 UTC|newest]
Thread overview: 32+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-08-22 1:53 [PATCH v7 00/29] KVM: arm64: Implement support for SME Mark Brown
2025-08-22 1:53 ` [PATCH v7 01/29] arm64/sysreg: Update SMIDR_EL1 to DDI0601 2025-06 Mark Brown
2025-08-22 1:53 ` [PATCH v7 02/29] arm64/fpsimd: Update FA64 and ZT0 enables when loading SME state Mark Brown
2025-08-22 1:53 ` [PATCH v7 03/29] arm64/fpsimd: Decide to save ZT0 and streaming mode FFR at bind time Mark Brown
2025-08-22 1:53 ` [PATCH v7 04/29] arm64/fpsimd: Check enable bit for FA64 when saving EFI state Mark Brown
2025-08-22 1:53 ` [PATCH v7 05/29] arm64/fpsimd: Determine maximum virtualisable SME vector length Mark Brown
2025-08-22 1:53 ` [PATCH v7 06/29] KVM: arm64: Introduce non-UNDEF FGT control Mark Brown
2025-08-22 1:53 ` [PATCH v7 07/29] KVM: arm64: Pay attention to FFR parameter in SVE save and load Mark Brown
2025-08-22 1:53 ` [PATCH v7 08/29] KVM: arm64: Pull ctxt_has_ helpers to start of sysreg-sr.h Mark Brown
2025-08-22 1:53 ` [PATCH v7 09/29] KVM: arm64: Move SVE state access macros after feature test macros Mark Brown
2025-08-22 1:53 ` [PATCH v7 10/29] KVM: arm64: Rename SVE finalization constants to be more general Mark Brown
2025-08-22 1:53 ` [PATCH v7 11/29] KVM: arm64: Document the KVM ABI for SME Mark Brown
2025-08-22 6:50 ` Randy Dunlap
2025-08-22 1:53 ` [PATCH v7 12/29] KVM: arm64: Define internal features " Mark Brown
2025-08-22 1:53 ` [PATCH v7 13/29] KVM: arm64: Rename sve_state_reg_region Mark Brown
2025-08-22 1:53 ` [PATCH v7 14/29] KVM: arm64: Store vector lengths in an array Mark Brown
2025-08-22 1:53 ` [PATCH v7 15/29] KVM: arm64: Implement SME vector length configuration Mark Brown
2025-08-22 1:53 ` [PATCH v7 16/29] KVM: arm64: Support SME control registers Mark Brown
2025-08-22 1:53 ` [PATCH v7 17/29] KVM: arm64: Support TPIDR2_EL0 Mark Brown
2025-08-22 1:53 ` [PATCH v7 18/29] KVM: arm64: Support SME identification registers for guests Mark Brown
2025-08-22 1:53 ` [PATCH v7 19/29] KVM: arm64: Support SME priority registers Mark Brown
2025-08-22 1:53 ` [PATCH v7 20/29] KVM: arm64: Provide assembly for SME register access Mark Brown
2025-08-22 1:53 ` [PATCH v7 21/29] KVM: arm64: Support userspace access to streaming mode Z and P registers Mark Brown
2025-08-22 1:53 ` [PATCH v7 22/29] KVM: arm64: Flush register state on writes to SVCR.SM and SVCR.ZA Mark Brown
2025-08-22 1:53 ` [PATCH v7 23/29] KVM: arm64: Expose SME specific state to userspace Mark Brown
2025-08-22 1:53 ` [PATCH v7 24/29] KVM: arm64: Context switch SME state for guests Mark Brown
2025-08-22 1:53 ` [PATCH v7 25/29] KVM: arm64: Handle SME exceptions Mark Brown
2025-08-22 1:53 ` [PATCH v7 26/29] KVM: arm64: Expose SME to nested guests Mark Brown
2025-08-22 1:53 ` [PATCH v7 27/29] KVM: arm64: Provide interface for configuring and enabling SME for guests Mark Brown
2025-08-22 1:53 ` [PATCH v7 28/29] KVM: arm64: selftests: Add SME system registers to get-reg-list Mark Brown
2025-08-22 1:53 ` [PATCH v7 29/29] KVM: arm64: selftests: Add SME to set_id_regs test Mark Brown
2025-09-01 12:44 ` Marc Zyngier [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=861poqe417.wl-maz@kernel.org \
--to=maz@kernel.org \
--cc=Dave.Martin@arm.com \
--cc=broonie@kernel.org \
--cc=catalin.marinas@arm.com \
--cc=corbet@lwn.net \
--cc=joey.gouly@arm.com \
--cc=kvm@vger.kernel.org \
--cc=kvmarm@lists.linux.dev \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-doc@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-kselftest@vger.kernel.org \
--cc=mark.rutland@arm.com \
--cc=oliver.upton@linux.dev \
--cc=pbonzini@redhat.com \
--cc=shuah@kernel.org \
--cc=suzuki.poulose@arm.com \
--cc=tabba@google.com \
--cc=will@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).