2009-01-04 06:23:10 +08:00
|
|
|
/*
|
2011-06-15 07:35:14 +08:00
|
|
|
* Copyright (C) 2008-2011 Freescale Semiconductor, Inc. All rights reserved.
|
2009-01-04 06:23:10 +08:00
|
|
|
*
|
2011-12-20 23:34:31 +08:00
|
|
|
* Author: Yu Liu <yu.liu@freescale.com>
|
2011-12-20 23:34:47 +08:00
|
|
|
* Scott Wood <scottwood@freescale.com>
|
2011-12-20 23:34:37 +08:00
|
|
|
* Ashish Kalra <ashish.kalra@freescale.com>
|
2011-12-20 23:34:47 +08:00
|
|
|
* Varun Sethi <varun.sethi@freescale.com>
|
2009-01-04 06:23:10 +08:00
|
|
|
*
|
|
|
|
* Description:
|
2011-12-20 23:34:31 +08:00
|
|
|
* This file is based on arch/powerpc/kvm/44x_tlb.h and
|
|
|
|
* arch/powerpc/include/asm/kvm_44x.h by Hollis Blanchard <hollisb@us.ibm.com>,
|
|
|
|
* Copyright IBM Corp. 2007-2008
|
2009-01-04 06:23:10 +08:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License, version 2, as
|
|
|
|
* published by the Free Software Foundation.
|
|
|
|
*/
|
|
|
|
|
2011-12-20 23:34:29 +08:00
|
|
|
#ifndef KVM_E500_H
|
|
|
|
#define KVM_E500_H
|
2009-01-04 06:23:10 +08:00
|
|
|
|
|
|
|
#include <linux/kvm_host.h>
|
2009-06-05 14:54:29 +08:00
|
|
|
#include <asm/mmu-book3e.h>
|
2009-01-04 06:23:10 +08:00
|
|
|
#include <asm/tlb.h>
|
2011-12-20 23:34:31 +08:00
|
|
|
|
|
|
|
#define E500_PID_NUM 3
|
|
|
|
#define E500_TLB_NUM 2
|
|
|
|
|
|
|
|
#define E500_TLB_VALID 1
|
|
|
|
#define E500_TLB_DIRTY 2
|
2011-12-20 23:34:37 +08:00
|
|
|
#define E500_TLB_BITMAP 4
|
2011-12-20 23:34:31 +08:00
|
|
|
|
|
|
|
struct tlbe_ref {
|
|
|
|
pfn_t pfn;
|
|
|
|
unsigned int flags; /* E500_TLB_* */
|
|
|
|
};
|
|
|
|
|
|
|
|
struct tlbe_priv {
|
|
|
|
struct tlbe_ref ref; /* TLB0 only -- TLB1 uses tlb_refs */
|
|
|
|
};
|
|
|
|
|
2012-02-16 07:40:00 +08:00
|
|
|
#ifdef CONFIG_KVM_E500V2
|
2011-12-20 23:34:31 +08:00
|
|
|
struct vcpu_id_table;
|
2011-12-20 23:34:34 +08:00
|
|
|
#endif
|
2011-12-20 23:34:31 +08:00
|
|
|
|
|
|
|
struct kvmppc_e500_tlb_params {
|
|
|
|
int entries, ways, sets;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct kvmppc_vcpu_e500 {
|
2011-12-20 23:34:32 +08:00
|
|
|
struct kvm_vcpu vcpu;
|
|
|
|
|
2011-12-20 23:34:31 +08:00
|
|
|
/* Unmodified copy of the guest's TLB -- shared with host userspace. */
|
|
|
|
struct kvm_book3e_206_tlb_entry *gtlb_arch;
|
|
|
|
|
|
|
|
/* Starting entry number in gtlb_arch[] */
|
|
|
|
int gtlb_offset[E500_TLB_NUM];
|
|
|
|
|
|
|
|
/* KVM internal information associated with each guest TLB entry */
|
|
|
|
struct tlbe_priv *gtlb_priv[E500_TLB_NUM];
|
|
|
|
|
|
|
|
struct kvmppc_e500_tlb_params gtlb_params[E500_TLB_NUM];
|
|
|
|
|
|
|
|
unsigned int gtlb_nv[E500_TLB_NUM];
|
|
|
|
|
|
|
|
/*
|
|
|
|
* information associated with each host TLB entry --
|
|
|
|
* TLB1 only for now. If/when guest TLB1 entries can be
|
|
|
|
* mapped with host TLB0, this will be used for that too.
|
|
|
|
*
|
|
|
|
* We don't want to use this for guest TLB0 because then we'd
|
|
|
|
* have the overhead of doing the translation again even if
|
|
|
|
* the entry is still in the guest TLB (e.g. we swapped out
|
|
|
|
* and back, and our host TLB entries got evicted).
|
|
|
|
*/
|
|
|
|
struct tlbe_ref *tlb_refs[E500_TLB_NUM];
|
|
|
|
unsigned int host_tlb1_nv;
|
|
|
|
|
|
|
|
u32 svr;
|
|
|
|
u32 l1csr0;
|
|
|
|
u32 l1csr1;
|
|
|
|
u32 hid0;
|
|
|
|
u32 hid1;
|
|
|
|
u64 mcar;
|
|
|
|
|
|
|
|
struct page **shared_tlb_pages;
|
|
|
|
int num_shared_tlb_pages;
|
2011-12-20 23:34:34 +08:00
|
|
|
|
2011-12-20 23:34:37 +08:00
|
|
|
u64 *g2h_tlb1_map;
|
|
|
|
unsigned int *h2g_tlb1_rmap;
|
|
|
|
|
2012-02-16 07:40:00 +08:00
|
|
|
#ifdef CONFIG_KVM_E500V2
|
2011-12-20 23:34:34 +08:00
|
|
|
u32 pid[E500_PID_NUM];
|
|
|
|
|
|
|
|
/* vcpu id table */
|
|
|
|
struct vcpu_id_table *idt;
|
|
|
|
#endif
|
2011-12-20 23:34:31 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static inline struct kvmppc_vcpu_e500 *to_e500(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
return container_of(vcpu, struct kvmppc_vcpu_e500, vcpu);
|
|
|
|
}
|
2009-01-04 06:23:10 +08:00
|
|
|
|
2011-12-20 23:34:47 +08:00
|
|
|
|
2011-08-19 04:25:21 +08:00
|
|
|
/* This geometry is the legacy default -- can be overridden by userspace */
|
|
|
|
#define KVM_E500_TLB0_WAY_SIZE 128
|
|
|
|
#define KVM_E500_TLB0_WAY_NUM 2
|
2009-01-04 06:23:10 +08:00
|
|
|
|
|
|
|
#define KVM_E500_TLB0_SIZE (KVM_E500_TLB0_WAY_SIZE * KVM_E500_TLB0_WAY_NUM)
|
|
|
|
#define KVM_E500_TLB1_SIZE 16
|
|
|
|
|
|
|
|
#define index_of(tlbsel, esel) (((tlbsel) << 16) | ((esel) & 0xFFFF))
|
|
|
|
#define tlbsel_of(index) ((index) >> 16)
|
|
|
|
#define esel_of(index) ((index) & 0xFFFF)
|
|
|
|
|
|
|
|
#define E500_TLB_USER_PERM_MASK (MAS3_UX|MAS3_UR|MAS3_UW)
|
|
|
|
#define E500_TLB_SUPER_PERM_MASK (MAS3_SX|MAS3_SR|MAS3_SW)
|
|
|
|
#define MAS2_ATTRIB_MASK \
|
2009-03-17 16:57:46 +08:00
|
|
|
(MAS2_X0 | MAS2_X1)
|
2009-01-04 06:23:10 +08:00
|
|
|
#define MAS3_ATTRIB_MASK \
|
|
|
|
(MAS3_U0 | MAS3_U1 | MAS3_U2 | MAS3_U3 \
|
|
|
|
| E500_TLB_USER_PERM_MASK | E500_TLB_SUPER_PERM_MASK)
|
|
|
|
|
2011-12-20 23:34:32 +08:00
|
|
|
int kvmppc_e500_emul_mt_mmucsr0(struct kvmppc_vcpu_e500 *vcpu_e500,
|
|
|
|
ulong value);
|
|
|
|
int kvmppc_e500_emul_tlbwe(struct kvm_vcpu *vcpu);
|
|
|
|
int kvmppc_e500_emul_tlbre(struct kvm_vcpu *vcpu);
|
|
|
|
int kvmppc_e500_emul_tlbivax(struct kvm_vcpu *vcpu, int ra, int rb);
|
2011-12-20 23:34:39 +08:00
|
|
|
int kvmppc_e500_emul_tlbilx(struct kvm_vcpu *vcpu, int rt, int ra, int rb);
|
2011-12-20 23:34:32 +08:00
|
|
|
int kvmppc_e500_emul_tlbsx(struct kvm_vcpu *vcpu, int rb);
|
|
|
|
int kvmppc_e500_tlb_init(struct kvmppc_vcpu_e500 *vcpu_e500);
|
|
|
|
void kvmppc_e500_tlb_uninit(struct kvmppc_vcpu_e500 *vcpu_e500);
|
|
|
|
|
|
|
|
void kvmppc_get_sregs_e500_tlb(struct kvm_vcpu *vcpu, struct kvm_sregs *sregs);
|
|
|
|
int kvmppc_set_sregs_e500_tlb(struct kvm_vcpu *vcpu, struct kvm_sregs *sregs);
|
2009-01-04 06:23:10 +08:00
|
|
|
|
2011-12-20 23:34:34 +08:00
|
|
|
|
2012-02-16 07:40:00 +08:00
|
|
|
#ifdef CONFIG_KVM_E500V2
|
2011-12-20 23:34:34 +08:00
|
|
|
unsigned int kvmppc_e500_get_sid(struct kvmppc_vcpu_e500 *vcpu_e500,
|
|
|
|
unsigned int as, unsigned int gid,
|
|
|
|
unsigned int pr, int avoid_recursion);
|
|
|
|
#endif
|
|
|
|
|
2009-01-04 06:23:10 +08:00
|
|
|
/* TLB helper functions */
|
2011-08-19 04:25:21 +08:00
|
|
|
static inline unsigned int
|
|
|
|
get_tlb_size(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-04 06:23:10 +08:00
|
|
|
{
|
2009-06-05 14:54:29 +08:00
|
|
|
return (tlbe->mas1 >> 7) & 0x1f;
|
2009-01-04 06:23:10 +08:00
|
|
|
}
|
|
|
|
|
2011-08-19 04:25:21 +08:00
|
|
|
static inline gva_t get_tlb_eaddr(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-04 06:23:10 +08:00
|
|
|
{
|
|
|
|
return tlbe->mas2 & 0xfffff000;
|
|
|
|
}
|
|
|
|
|
2011-08-19 04:25:21 +08:00
|
|
|
static inline u64 get_tlb_bytes(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-04 06:23:10 +08:00
|
|
|
{
|
|
|
|
unsigned int pgsize = get_tlb_size(tlbe);
|
2009-06-05 14:54:29 +08:00
|
|
|
return 1ULL << 10 << pgsize;
|
2009-01-04 06:23:10 +08:00
|
|
|
}
|
|
|
|
|
2011-08-19 04:25:21 +08:00
|
|
|
static inline gva_t get_tlb_end(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-04 06:23:10 +08:00
|
|
|
{
|
|
|
|
u64 bytes = get_tlb_bytes(tlbe);
|
|
|
|
return get_tlb_eaddr(tlbe) + bytes - 1;
|
|
|
|
}
|
|
|
|
|
2011-08-19 04:25:21 +08:00
|
|
|
static inline u64 get_tlb_raddr(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-04 06:23:10 +08:00
|
|
|
{
|
2011-08-19 04:25:21 +08:00
|
|
|
return tlbe->mas7_3 & ~0xfffULL;
|
2009-01-04 06:23:10 +08:00
|
|
|
}
|
|
|
|
|
2011-08-19 04:25:21 +08:00
|
|
|
static inline unsigned int
|
|
|
|
get_tlb_tid(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-04 06:23:10 +08:00
|
|
|
{
|
|
|
|
return (tlbe->mas1 >> 16) & 0xff;
|
|
|
|
}
|
|
|
|
|
2011-08-19 04:25:21 +08:00
|
|
|
static inline unsigned int
|
|
|
|
get_tlb_ts(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-04 06:23:10 +08:00
|
|
|
{
|
|
|
|
return (tlbe->mas1 >> 12) & 0x1;
|
|
|
|
}
|
|
|
|
|
2011-08-19 04:25:21 +08:00
|
|
|
static inline unsigned int
|
|
|
|
get_tlb_v(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-04 06:23:10 +08:00
|
|
|
{
|
|
|
|
return (tlbe->mas1 >> 31) & 0x1;
|
|
|
|
}
|
|
|
|
|
2011-08-19 04:25:21 +08:00
|
|
|
static inline unsigned int
|
|
|
|
get_tlb_iprot(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-04 06:23:10 +08:00
|
|
|
{
|
|
|
|
return (tlbe->mas1 >> 30) & 0x1;
|
|
|
|
}
|
|
|
|
|
2011-12-20 23:34:34 +08:00
|
|
|
static inline unsigned int
|
|
|
|
get_tlb_tsize(const struct kvm_book3e_206_tlb_entry *tlbe)
|
|
|
|
{
|
|
|
|
return (tlbe->mas1 & MAS1_TSIZE_MASK) >> MAS1_TSIZE_SHIFT;
|
|
|
|
}
|
|
|
|
|
2009-01-04 06:23:10 +08:00
|
|
|
static inline unsigned int get_cur_pid(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
return vcpu->arch.pid & 0xff;
|
|
|
|
}
|
|
|
|
|
2011-06-15 07:35:14 +08:00
|
|
|
static inline unsigned int get_cur_as(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
return !!(vcpu->arch.shared->msr & (MSR_IS | MSR_DS));
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline unsigned int get_cur_pr(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
return !!(vcpu->arch.shared->msr & MSR_PR);
|
|
|
|
}
|
|
|
|
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 08:23:30 +08:00
|
|
|
static inline unsigned int get_cur_spid(const struct kvm_vcpu *vcpu)
|
2009-01-04 06:23:10 +08:00
|
|
|
{
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 08:23:30 +08:00
|
|
|
return (vcpu->arch.shared->mas6 >> 16) & 0xff;
|
2009-01-04 06:23:10 +08:00
|
|
|
}
|
|
|
|
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 08:23:30 +08:00
|
|
|
static inline unsigned int get_cur_sas(const struct kvm_vcpu *vcpu)
|
2009-01-04 06:23:10 +08:00
|
|
|
{
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 08:23:30 +08:00
|
|
|
return vcpu->arch.shared->mas6 & 0x1;
|
2009-01-04 06:23:10 +08:00
|
|
|
}
|
|
|
|
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 08:23:30 +08:00
|
|
|
static inline unsigned int get_tlb_tlbsel(const struct kvm_vcpu *vcpu)
|
2009-01-04 06:23:10 +08:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Manual says that tlbsel has 2 bits wide.
|
2009-01-15 00:47:37 +08:00
|
|
|
* Since we only have two TLBs, only lower bit is used.
|
2009-01-04 06:23:10 +08:00
|
|
|
*/
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 08:23:30 +08:00
|
|
|
return (vcpu->arch.shared->mas0 >> 28) & 0x1;
|
2009-01-04 06:23:10 +08:00
|
|
|
}
|
|
|
|
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 08:23:30 +08:00
|
|
|
static inline unsigned int get_tlb_nv_bit(const struct kvm_vcpu *vcpu)
|
2009-01-04 06:23:10 +08:00
|
|
|
{
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 08:23:30 +08:00
|
|
|
return vcpu->arch.shared->mas0 & 0xfff;
|
2009-01-04 06:23:10 +08:00
|
|
|
}
|
|
|
|
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 08:23:30 +08:00
|
|
|
static inline unsigned int get_tlb_esel_bit(const struct kvm_vcpu *vcpu)
|
2009-01-04 06:23:10 +08:00
|
|
|
{
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 08:23:30 +08:00
|
|
|
return (vcpu->arch.shared->mas0 >> 16) & 0xfff;
|
2009-01-04 06:23:10 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline int tlbe_is_host_safe(const struct kvm_vcpu *vcpu,
|
2011-08-19 04:25:21 +08:00
|
|
|
const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-04 06:23:10 +08:00
|
|
|
{
|
|
|
|
gpa_t gpa;
|
|
|
|
|
|
|
|
if (!get_tlb_v(tlbe))
|
|
|
|
return 0;
|
|
|
|
|
2011-12-20 23:34:47 +08:00
|
|
|
#ifndef CONFIG_KVM_BOOKE_HV
|
2009-01-04 06:23:10 +08:00
|
|
|
/* Does it match current guest AS? */
|
|
|
|
/* XXX what about IS != DS? */
|
2010-07-29 20:47:43 +08:00
|
|
|
if (get_tlb_ts(tlbe) != !!(vcpu->arch.shared->msr & MSR_IS))
|
2009-01-04 06:23:10 +08:00
|
|
|
return 0;
|
2011-12-20 23:34:47 +08:00
|
|
|
#endif
|
2009-01-04 06:23:10 +08:00
|
|
|
|
|
|
|
gpa = get_tlb_raddr(tlbe);
|
|
|
|
if (!gfn_to_memslot(vcpu->kvm, gpa >> PAGE_SHIFT))
|
|
|
|
/* Mapping is not for RAM. */
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2011-12-20 23:34:34 +08:00
|
|
|
static inline struct kvm_book3e_206_tlb_entry *get_entry(
|
|
|
|
struct kvmppc_vcpu_e500 *vcpu_e500, int tlbsel, int entry)
|
|
|
|
{
|
|
|
|
int offset = vcpu_e500->gtlb_offset[tlbsel];
|
|
|
|
return &vcpu_e500->gtlb_arch[offset + entry];
|
|
|
|
}
|
|
|
|
|
|
|
|
void kvmppc_e500_tlbil_one(struct kvmppc_vcpu_e500 *vcpu_e500,
|
|
|
|
struct kvm_book3e_206_tlb_entry *gtlbe);
|
|
|
|
void kvmppc_e500_tlbil_all(struct kvmppc_vcpu_e500 *vcpu_e500);
|
|
|
|
|
2011-12-20 23:34:47 +08:00
|
|
|
#ifdef CONFIG_KVM_BOOKE_HV
|
|
|
|
#define kvmppc_e500_get_tlb_stid(vcpu, gtlbe) get_tlb_tid(gtlbe)
|
|
|
|
#define get_tlbmiss_tid(vcpu) get_cur_pid(vcpu)
|
|
|
|
#define get_tlb_sts(gtlbe) (gtlbe->mas1 & MAS1_TS)
|
|
|
|
#else
|
2011-12-20 23:34:34 +08:00
|
|
|
unsigned int kvmppc_e500_get_tlb_stid(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_book3e_206_tlb_entry *gtlbe);
|
|
|
|
|
|
|
|
static inline unsigned int get_tlbmiss_tid(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
struct kvmppc_vcpu_e500 *vcpu_e500 = to_e500(vcpu);
|
|
|
|
unsigned int tidseld = (vcpu->arch.shared->mas4 >> 16) & 0xf;
|
|
|
|
|
|
|
|
return vcpu_e500->pid[tidseld];
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Force TS=1 for all guest mappings. */
|
|
|
|
#define get_tlb_sts(gtlbe) (MAS1_TS)
|
2011-12-20 23:34:47 +08:00
|
|
|
#endif /* !BOOKE_HV */
|
2011-12-20 23:34:34 +08:00
|
|
|
|
2011-12-20 23:34:29 +08:00
|
|
|
#endif /* KVM_E500_H */
|