From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id AB5A334F49C; Wed, 18 Mar 2026 17:46:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773855962; cv=none; b=p22V6xE5FDMKyYgUNxfNv6STD6B4UXFRw2IeRWvAYk30/2nuiARqNJmZsp/DMX+aBVBcD4KougcrtaTIR05o6szb9+LZXP029kV7r8E6hP9hus3OlTvqbZ5WrrEmXs9Hl2ivkKMytDAmsmyCSX1G12HsCh3vGfkLQNndJackkaE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773855962; c=relaxed/simple; bh=MOvYZ+RP0OfudcUMaKcfufnIX4ujNiNNOumMn0yDLZU=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=U+Lo1mKQHqoQBRfJ8hgIIhHz4sP3wXhRqPa82hpOvnAJHnvj5/3MFw46szz5NOwCukoAflLrnvYbZZd8qNWppURqR1F9SclgpJ6FqYumqA8pv7Lx8/kqpkdy6EdLRFpdikF8QcFdp8O6emE8rl01OTfBL6UrsaeZeo9xE2boKQ4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Nw6fvwjC; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Nw6fvwjC" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 251F2C2BCB0; Wed, 18 Mar 2026 17:45:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1773855962; bh=MOvYZ+RP0OfudcUMaKcfufnIX4ujNiNNOumMn0yDLZU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Nw6fvwjChuu9h9boR8PWVh8oMq3fNZcpVkGAlB6dnRfDYzkTvYVG6QvmqH528lQQB RFwUl9kDYy8+tzI9GZECHOISPPFPxRdd5DvWxwZPoLGh2HlEcarnpbWrzYcGiRuOKs LTquVZZ6vUqYSlHPzb70eN4o2AOh4rv5hTUI/d2hDQ1YiitHyF+G72jmO+hmfvQW4h WEy1nrxrFQla4YrXfoYzS+DnnHtq8u7i+GHUtRzIzAdJVnN/OjUF+2oO146+nQ/l/T qR+Igk1X2rJhqEcKzitkvzrP9n6xCtK5W03QpDFHd1OUxpx5lxqdzD1KOqRCNgV+FG b4DlKGmx+TPIQ== Date: Wed, 18 Mar 2026 17:46:14 +0000 From: Jean-Philippe Brucker To: Mark Brown Cc: Marc Zyngier , Joey Gouly , Catalin Marinas , Suzuki K Poulose , Will Deacon , Paolo Bonzini , Jonathan Corbet , Shuah Khan , Oliver Upton , Dave Martin , Fuad Tabba , Mark Rutland , Ben Horgan , linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, linux-kselftest@vger.kernel.org, Peter Maydell , Eric Auger Subject: Re: [PATCH v10 10/30] KVM: arm64: Rename sve_state_reg_region Message-ID: <20260318174614.GH2390801@myrica> References: <20260306-kvm-arm64-sme-v10-0-43f7683a0fb7@kernel.org> <20260306-kvm-arm64-sme-v10-10-43f7683a0fb7@kernel.org> Precedence: bulk X-Mailing-List: linux-kselftest@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20260306-kvm-arm64-sme-v10-10-43f7683a0fb7@kernel.org> On Fri, Mar 06, 2026 at 05:01:02PM +0000, Mark Brown wrote: > As for SVE we will need to pull parts of dynamically sized registers out of > a block of memory for SME so we will use a similar code pattern for this. > Rename the current struct sve_state_reg_region in preparation for this. > > No functional change. > > Reviewed-by: Fuad Tabba > Signed-off-by: Mark Brown Reviewed-by: Jean-Philippe Brucker > --- > arch/arm64/kvm/guest.c | 12 ++++++------ > 1 file changed, 6 insertions(+), 6 deletions(-) > > diff --git a/arch/arm64/kvm/guest.c b/arch/arm64/kvm/guest.c > index d15aa2da1891..8c3405b5d7b1 100644 > --- a/arch/arm64/kvm/guest.c > +++ b/arch/arm64/kvm/guest.c > @@ -404,9 +404,9 @@ static int set_sve_vls(struct kvm_vcpu *vcpu, const struct kvm_one_reg *reg) > */ > #define vcpu_sve_slices(vcpu) 1 > > -/* Bounds of a single SVE register slice within vcpu->arch.sve_state */ > -struct sve_state_reg_region { > - unsigned int koffset; /* offset into sve_state in kernel memory */ > +/* Bounds of a single register slice within vcpu->arch.s[mv]e_state */ > +struct vec_state_reg_region { > + unsigned int koffset; /* offset into s[mv]e_state in kernel memory */ > unsigned int klen; /* length in kernel memory */ > unsigned int upad; /* extra trailing padding in user memory */ > }; > @@ -415,7 +415,7 @@ struct sve_state_reg_region { > * Validate SVE register ID and get sanitised bounds for user/kernel SVE > * register copy > */ > -static int sve_reg_to_region(struct sve_state_reg_region *region, > +static int sve_reg_to_region(struct vec_state_reg_region *region, > struct kvm_vcpu *vcpu, > const struct kvm_one_reg *reg) > { > @@ -485,7 +485,7 @@ static int sve_reg_to_region(struct sve_state_reg_region *region, > static int get_sve_reg(struct kvm_vcpu *vcpu, const struct kvm_one_reg *reg) > { > int ret; > - struct sve_state_reg_region region; > + struct vec_state_reg_region region; > char __user *uptr = (char __user *)reg->addr; > > /* Handle the KVM_REG_ARM64_SVE_VLS pseudo-reg as a special case: */ > @@ -511,7 +511,7 @@ static int get_sve_reg(struct kvm_vcpu *vcpu, const struct kvm_one_reg *reg) > static int set_sve_reg(struct kvm_vcpu *vcpu, const struct kvm_one_reg *reg) > { > int ret; > - struct sve_state_reg_region region; > + struct vec_state_reg_region region; > const char __user *uptr = (const char __user *)reg->addr; > > /* Handle the KVM_REG_ARM64_SVE_VLS pseudo-reg as a special case: */ > > -- > 2.47.3 > >