From nobody Wed Nov 27 07:44:39 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org ARC-Seal: i=1; a=rsa-sha256; t=1699897895; cv=none; d=zohomail.com; s=zohoarc; b=USrpP/muUMZ4Q5QektBUQuvpSBH4KKHSTCeUqRhwX8KsewTs9ortwI8u2HwUs0ER8zlkwgPrv84NCti1DsVp2c7J1EEiPRmqMrx3VIYGAYOPZnPJU6F8IlIr+pUqqRdmVjgt3GBdbx3iJHxy1aV4y8LNkQWcr05wvVS6WdGEKyU= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1699897895; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=fZ1VrrtWk1nduWUh835SHfxyaNVb4BnIs3BTwPsszNo=; b=k/zykOP8AxUS4dgGz+jbRwYfPrqdWRs/DNEmJyRVZvgyCCbQSEsYU+XIiULtzoW6vCvKUZQDC+Zjfcy9znNXrdWiXc/bJVZR3iVh90pOffFatCAH3dXpDPpkShD57g/1pPbUAYNw8l87u26AO2qpr7/Nz3vDd2ANpODQ5sRABRQ= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1699897895243292.3824923641689; Mon, 13 Nov 2023 09:51:35 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1r2b57-00036v-Ou; Mon, 13 Nov 2023 12:50:41 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1r2b4y-00032z-3L for qemu-devel@nongnu.org; Mon, 13 Nov 2023 12:50:32 -0500 Received: from mail-pg1-x532.google.com ([2607:f8b0:4864:20::532]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1r2b4s-0003yf-44 for qemu-devel@nongnu.org; Mon, 13 Nov 2023 12:50:31 -0500 Received: by mail-pg1-x532.google.com with SMTP id 41be03b00d2f7-5aa481d53e5so3089291a12.1 for ; Mon, 13 Nov 2023 09:50:21 -0800 (PST) Received: from grind.. ([152.250.131.148]) by smtp.gmail.com with ESMTPSA id hg23-20020a17090b301700b00277560ecd5dsm5869329pjb.46.2023.11.13.09.50.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 13 Nov 2023 09:50:19 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ventanamicro.com; s=google; t=1699897819; x=1700502619; darn=nongnu.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=fZ1VrrtWk1nduWUh835SHfxyaNVb4BnIs3BTwPsszNo=; b=EUpFpa7/szxmNeDFML9Ki5TC/t6JcZvBA8HwuAYyI+0I5W2a0bH9e4WxR5OrmYqZMT xw0qH+mAUrLGPIsZr/z7klL8U9Ti+UFKi0oBwcRi2TgTG+s+MFZcI5NL0CVQzqzz4oyP VNtjj6BhSFt3pd5u73ijYhHjgwvUP6erj2Qt+eYgQm7bCc17tCV+epEyjC+z2hEKZy0x sk6mU1mEKBPPLivC1mq20xMDKKnZ3EkgcqNNKmPPhEkPn4W8Qhf6EtKHT4ST4gE/sNau YwQa6Px7c9M7w8AZfN/3R7UA8SwE38kj3Vx6kE3zp+1Q4NrHfIsn9vc0cmEhahSJGz0u Euxg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1699897819; x=1700502619; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=fZ1VrrtWk1nduWUh835SHfxyaNVb4BnIs3BTwPsszNo=; b=IuSuL+WWwJSytpZG2s6Nk0Dv2/pRIiRFuMB4kOiBoOMhnzdwuPJxap62DQuA1uzYE/ wuf+hre1seMm0pokAkHuLK18n4eIYuExq9BGa1j1uNja5YTbY0eOhOyscu6z9CVS6nhQ Troab6UE0OljNrX3plesqBCpHAXCO1Xd6IXFXNVanrx0wp3YtA9j68Ov5LzK7X1zNnhN AXdTlyiZsBLBxJ67v96UKslfJxU626c3XhxKanDq7p/Pczuzg0QwOBllhKGlZZmy3jzz mLZKurCawRCqbP7H0we3M1eFuNMrRoVrLLc7b2r2iFu9j8owPb22fqRs7mIwGpgWaCEn MJxg== X-Gm-Message-State: AOJu0YyQkZkPbN36IrnwRLJMhbEkGsAQWWklXL2tpSUKqFmyujDMI1sb E2W7o4lStmOFouu3023jSalmBpnXHwxyaOuf108= X-Google-Smtp-Source: AGHT+IGzKH/aDurWAx8swMAh5h+B9UO5eJXvmVMRRvjPj7c2bS7eYaTtwVF7fi0gvphbTGutWak01g== X-Received: by 2002:a17:90b:33c7:b0:280:ff37:8981 with SMTP id lk7-20020a17090b33c700b00280ff378981mr4920190pjb.44.1699897819604; Mon, 13 Nov 2023 09:50:19 -0800 (PST) From: Daniel Henrique Barboza To: qemu-devel@nongnu.org Cc: qemu-stable@nongnu.org, mjt@tls.msk.ru, alistair.francis@wdc.com, Daniel Henrique Barboza , Andrew Jones , =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= Subject: [PATCH stable-8.1.3 1/2] target/riscv/kvm: improve 'init_multiext_cfg' error msg Date: Mon, 13 Nov 2023 14:50:10 -0300 Message-ID: <20231113175011.151022-2-dbarboza@ventanamicro.com> X-Mailer: git-send-email 2.41.0 In-Reply-To: <20231113175011.151022-1-dbarboza@ventanamicro.com> References: <20231113175011.151022-1-dbarboza@ventanamicro.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=2607:f8b0:4864:20::532; envelope-from=dbarboza@ventanamicro.com; helo=mail-pg1-x532.google.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_HELO_TEMPERROR=0.01 autolearn=unavailable autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @ventanamicro.com) X-ZM-MESSAGEID: 1699897896837100003 Our error message is returning the value of 'ret', which will be always -1 in case of error, and will not be that useful: qemu-system-riscv64: Unable to read ISA_EXT KVM register ssaia, error -1 Improve the error message by outputting 'errno' instead of 'ret'. Use strerrorname_np() to output the error name instead of the error code. This will give us what we need to know right away: qemu-system-riscv64: Unable to read ISA_EXT KVM register ssaia, error code:= ENOENT Given that we're going to exit(1) in this condition instead of attempting to recover, remove the 'kvm_riscv_destroy_scratch_vcpu()' call. Signed-off-by: Daniel Henrique Barboza Reviewed-by: Alistair Francis Reviewed-by: Andrew Jones Reviewed-by: Philippe Mathieu-Daud=C3=A9 Message-ID: <20231003132148.797921-2-dbarboza@ventanamicro.com> Signed-off-by: Alistair Francis (cherry picked from commit 082e9e4a58ba80ec056220a2f762a1c6b9a3a96c) --- target/riscv/kvm.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/target/riscv/kvm.c b/target/riscv/kvm.c index dbcf26f27d..c8e1bb9087 100644 --- a/target/riscv/kvm.c +++ b/target/riscv/kvm.c @@ -727,8 +727,8 @@ static void kvm_riscv_init_multiext_cfg(RISCVCPU *cpu, = KVMScratchCPU *kvmcpu) val =3D false; } else { error_report("Unable to read ISA_EXT KVM register %s, " - "error %d", multi_ext_cfg->name, ret); - kvm_riscv_destroy_scratch_vcpu(kvmcpu); + "error code: %s", multi_ext_cfg->name, + strerrorname_np(errno)); exit(EXIT_FAILURE); } } else { --=20 2.41.0 From nobody Wed Nov 27 07:44:39 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org ARC-Seal: i=1; a=rsa-sha256; t=1699897881; cv=none; d=zohomail.com; s=zohoarc; b=mEIUmgJvttdg1S9rPymGxyup/y61icVZ28ZIUwrkGjXe/A4UVQUZLO7yOp9SOeQyGHmrbT3SMHRaxvOR1nhNufT/+6RU+PoPbiLoGlSNkM0CW9G8lFpwy7KibQEJkH6LdQ8Zf0weTLUO0CHS63eFqAkjr6vj0BQ2vU00/fjm7vA= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1699897881; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=gXk9JJuHWXIC7hCJTygEtlFoprhsENRX8ZByQS+6clk=; b=Jk4FcxpC2OWzuY5Sh+PWXjjzxahGWJG3u2sY6QNuxeWANtfX9mT/JR3Xxf7Y4xWy4a+seLt6A4t5RxDOqrSpR30/P0zisIMssSPkL35whibm5/7IzM7fQxs3CqRC7oam/HVTY+k3dO7GmWgnmvGk7ONWxiounMEPW57hXC7iUgk= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1699897881353503.422547906099; Mon, 13 Nov 2023 09:51:21 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1r2b5A-00039k-3d; Mon, 13 Nov 2023 12:50:44 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1r2b50-00033S-Ek for qemu-devel@nongnu.org; Mon, 13 Nov 2023 12:50:37 -0500 Received: from mail-pj1-x102c.google.com ([2607:f8b0:4864:20::102c]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1r2b4t-0003yl-Bq for qemu-devel@nongnu.org; Mon, 13 Nov 2023 12:50:34 -0500 Received: by mail-pj1-x102c.google.com with SMTP id 98e67ed59e1d1-28094a3b760so3750165a91.3 for ; Mon, 13 Nov 2023 09:50:23 -0800 (PST) Received: from grind.. ([152.250.131.148]) by smtp.gmail.com with ESMTPSA id hg23-20020a17090b301700b00277560ecd5dsm5869329pjb.46.2023.11.13.09.50.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 13 Nov 2023 09:50:21 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ventanamicro.com; s=google; t=1699897822; x=1700502622; darn=nongnu.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=gXk9JJuHWXIC7hCJTygEtlFoprhsENRX8ZByQS+6clk=; b=gKKKKCoqw0byGlul+StO4b8q9l0QOyPAadi1alS1F6t7Af10AIltsMe3KJg+qAAUif OKVkHTFyHXprQvRcizrbUfxJg2d5h0Yl5Wk6PY575AP3S4UzmlpmABtgGRYXFDyGzfUU bmkobU+ukYo8ON4bUMRlu/MsHru1KyEeQxhUsm1RSBBOp0lahRcK3Gtgf9J/KErYBI65 yUARnl3yMv4A0BhEH0VjxCCpIqTSlh3iRACsV96CqF4i7EUI3CzjsUAEqYAZor35A9kl DdJG0Gz34HYJnAu9tjd46t08tEDzWIi81aneCiKeivOBBAB0Q6CxG/1+ymBS6T5LsIVU mfKA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1699897822; x=1700502622; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=gXk9JJuHWXIC7hCJTygEtlFoprhsENRX8ZByQS+6clk=; b=Yay2mfL+mELKQSKfcMQouyS+Vr8rt0oTK7WzS9ld/A684Gi1+F2k27kB9Xu8RiwxtV TpZQbeimIiWNVHqmAwRwPE6H3TYv6b2vvgbAHDtKGUk8cLwgUnkzME/d4jKSzYrbFhCb e9Ud+69ssNIfc+sPUUFWE5Tz0PBPAOqmdOmj58m2LBr5NLWUeBE2pwPWUw678YbOLuog 5jFmWlu0C3B29gE8/cNRiwn1EOfGKLFtWX5toy/x/cLs4uubMa5ZRbQ7VJg2siR/l6ah hQmVW+cEQNLxGur8L6NKgvcZ0OvYSFZsuoA2+Pg5F0fB3rc5g09AN02WgkGZIkaLndJn rrLQ== X-Gm-Message-State: AOJu0Yz47noQnMwvwmcapIFn5pHEWfga+PC43ycOFVFZTIi/huBuQaUy o/NALxP3BXmViqGFRu1UY+B4PjaEZWgtb2bBdrk= X-Google-Smtp-Source: AGHT+IGTJPadGyG8fU0l3EHo/uYH9uOJ06Yro6v78v+XSOvBGFmLAfs7lnUlw8RbX7rQ8N8HMDpWTA== X-Received: by 2002:a17:90b:3012:b0:281:df:fb2a with SMTP id hg18-20020a17090b301200b0028100dffb2amr5033983pjb.35.1699897822298; Mon, 13 Nov 2023 09:50:22 -0800 (PST) From: Daniel Henrique Barboza To: qemu-devel@nongnu.org Cc: qemu-stable@nongnu.org, mjt@tls.msk.ru, alistair.francis@wdc.com, Daniel Henrique Barboza , Andrew Jones Subject: [PATCH stable-8.1.3 2/2] target/riscv/kvm: support KVM_GET_REG_LIST Date: Mon, 13 Nov 2023 14:50:11 -0300 Message-ID: <20231113175011.151022-3-dbarboza@ventanamicro.com> X-Mailer: git-send-email 2.41.0 In-Reply-To: <20231113175011.151022-1-dbarboza@ventanamicro.com> References: <20231113175011.151022-1-dbarboza@ventanamicro.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=2607:f8b0:4864:20::102c; envelope-from=dbarboza@ventanamicro.com; helo=mail-pj1-x102c.google.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=unavailable autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @ventanamicro.com) X-ZM-MESSAGEID: 1699897882788100003 Content-Type: text/plain; charset="utf-8" KVM for RISC-V started supporting KVM_GET_REG_LIST in Linux 6.6. It consists of a KVM ioctl() that retrieves a list of all available regs for get_one_reg/set_one_reg. Regs that aren't present in the list aren't supported in the host. This simplifies our lives when initing the KVM regs since we don't have to always attempt a KVM_GET_ONE_REG for all regs QEMU knows. We'll only attempt a get_one_reg() if we're sure the reg is supported, i.e. it was retrieved by KVM_GET_REG_LIST. Any error in get_one_reg() will then always considered fatal, instead of having to handle special error codes that might indicate a non-fatal failure. Start by moving the current kvm_riscv_init_multiext_cfg() logic into a new kvm_riscv_read_multiext_legacy() helper. We'll prioritize using KVM_GET_REG_LIST, so check if we have it available and, in case we don't, use the legacy() logic. Otherwise, retrieve the available reg list and use it to check if the host supports our known KVM regs, doing the usual get_one_reg() for the supported regs and setting cpu->cfg accordingly. Signed-off-by: Daniel Henrique Barboza Acked-by: Alistair Francis Reviewed-by: Andrew Jones Message-ID: <20231003132148.797921-3-dbarboza@ventanamicro.com> Signed-off-by: Alistair Francis (cherry picked from commit 608bdebb6075b757e5505f6bbc60c45a54a1390b) --- target/riscv/kvm.c | 96 +++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 95 insertions(+), 1 deletion(-) diff --git a/target/riscv/kvm.c b/target/riscv/kvm.c index c8e1bb9087..3fb29299d9 100644 --- a/target/riscv/kvm.c +++ b/target/riscv/kvm.c @@ -706,7 +706,8 @@ static void kvm_riscv_read_cbomz_blksize(RISCVCPU *cpu,= KVMScratchCPU *kvmcpu, } } =20 -static void kvm_riscv_init_multiext_cfg(RISCVCPU *cpu, KVMScratchCPU *kvmc= pu) +static void kvm_riscv_read_multiext_legacy(RISCVCPU *cpu, + KVMScratchCPU *kvmcpu) { CPURISCVState *env =3D &cpu->env; uint64_t val; @@ -747,6 +748,99 @@ static void kvm_riscv_init_multiext_cfg(RISCVCPU *cpu,= KVMScratchCPU *kvmcpu) } } =20 +static int uint64_cmp(const void *a, const void *b) +{ + uint64_t val1 =3D *(const uint64_t *)a; + uint64_t val2 =3D *(const uint64_t *)b; + + if (val1 < val2) { + return -1; + } + + if (val1 > val2) { + return 1; + } + + return 0; +} + +static void kvm_riscv_init_multiext_cfg(RISCVCPU *cpu, KVMScratchCPU *kvmc= pu) +{ + KVMCPUConfig *multi_ext_cfg; + struct kvm_one_reg reg; + struct kvm_reg_list rl_struct; + struct kvm_reg_list *reglist; + uint64_t val, reg_id, *reg_search; + int i, ret; + + rl_struct.n =3D 0; + ret =3D ioctl(kvmcpu->cpufd, KVM_GET_REG_LIST, &rl_struct); + + /* + * If KVM_GET_REG_LIST isn't supported we'll get errno 22 + * (EINVAL). Use read_legacy() in this case. + */ + if (errno =3D=3D EINVAL) { + return kvm_riscv_read_multiext_legacy(cpu, kvmcpu); + } else if (errno !=3D E2BIG) { + /* + * E2BIG is an expected error message for the API since we + * don't know the number of registers. The right amount will + * be written in rl_struct.n. + * + * Error out if we get any other errno. + */ + error_report("Error when accessing get-reg-list, code: %s", + strerrorname_np(errno)); + exit(EXIT_FAILURE); + } + + reglist =3D g_malloc(sizeof(struct kvm_reg_list) + + rl_struct.n * sizeof(uint64_t)); + reglist->n =3D rl_struct.n; + ret =3D ioctl(kvmcpu->cpufd, KVM_GET_REG_LIST, reglist); + if (ret) { + error_report("Error when reading KVM_GET_REG_LIST, code %s ", + strerrorname_np(errno)); + exit(EXIT_FAILURE); + } + + /* sort reglist to use bsearch() */ + qsort(®list->reg, reglist->n, sizeof(uint64_t), uint64_cmp); + + for (i =3D 0; i < ARRAY_SIZE(kvm_multi_ext_cfgs); i++) { + multi_ext_cfg =3D &kvm_multi_ext_cfgs[i]; + reg_id =3D kvm_riscv_reg_id(&cpu->env, KVM_REG_RISCV_ISA_EXT, + multi_ext_cfg->kvm_reg_id); + reg_search =3D bsearch(®_id, reglist->reg, reglist->n, + sizeof(uint64_t), uint64_cmp); + if (!reg_search) { + continue; + } + + reg.id =3D reg_id; + reg.addr =3D (uint64_t)&val; + ret =3D ioctl(kvmcpu->cpufd, KVM_GET_ONE_REG, ®); + if (ret !=3D 0) { + error_report("Unable to read ISA_EXT KVM register %s, " + "error code: %s", multi_ext_cfg->name, + strerrorname_np(errno)); + exit(EXIT_FAILURE); + } + + multi_ext_cfg->supported =3D true; + kvm_cpu_cfg_set(cpu, multi_ext_cfg, val); + } + + if (cpu->cfg.ext_icbom) { + kvm_riscv_read_cbomz_blksize(cpu, kvmcpu, &kvm_cbom_blocksize); + } + + if (cpu->cfg.ext_icboz) { + kvm_riscv_read_cbomz_blksize(cpu, kvmcpu, &kvm_cboz_blocksize); + } +} + void kvm_riscv_init_user_properties(Object *cpu_obj) { RISCVCPU *cpu =3D RISCV_CPU(cpu_obj); --=20 2.41.0