2019-06-04 11:11:33 +03:00
/* SPDX-License-Identifier: GPL-2.0-only */
2009-01-04 01:23:10 +03:00
/*
2011-06-15 03:35:14 +04:00
* Copyright ( C ) 2008 - 2011 Freescale Semiconductor , Inc . All rights reserved .
2009-01-04 01:23:10 +03:00
*
2011-12-20 19:34:31 +04:00
* Author : Yu Liu < yu . liu @ freescale . com >
2011-12-20 19:34:47 +04:00
* Scott Wood < scottwood @ freescale . com >
2011-12-20 19:34:37 +04:00
* Ashish Kalra < ashish . kalra @ freescale . com >
2011-12-20 19:34:47 +04:00
* Varun Sethi < varun . sethi @ freescale . com >
2009-01-04 01:23:10 +03:00
*
* Description :
2011-12-20 19:34:31 +04:00
* This file is based on arch / powerpc / kvm / 44 x_tlb . h and
* arch / powerpc / include / asm / kvm_44x . h by Hollis Blanchard < hollisb @ us . ibm . com > ,
* Copyright IBM Corp . 2007 - 2008
2009-01-04 01:23:10 +03:00
*/
2011-12-20 19:34:29 +04:00
# ifndef KVM_E500_H
# define KVM_E500_H
2009-01-04 01:23:10 +03:00
# include <linux/kvm_host.h>
2018-11-29 17:06:55 +03:00
# include <asm/nohash/mmu-book3e.h>
2009-01-04 01:23:10 +03:00
# include <asm/tlb.h>
2014-09-01 13:01:58 +04:00
# include <asm/cputhreads.h>
2011-12-20 19:34:31 +04:00
2013-04-11 04:03:10 +04:00
enum vcpu_ftr {
VCPU_FTR_MMU_V2
} ;
2011-12-20 19:34:31 +04:00
# define E500_PID_NUM 3
# define E500_TLB_NUM 2
2013-03-06 20:02:49 +04:00
/* entry is mapped somewhere in host TLB */
2013-11-18 09:48:54 +04:00
# define E500_TLB_VALID (1 << 31)
2013-03-06 20:02:49 +04:00
/* TLB1 entry is mapped by host TLB1, tracked by bitmaps */
2013-11-18 09:48:54 +04:00
# define E500_TLB_BITMAP (1 << 30)
2013-03-06 20:02:49 +04:00
/* TLB1 entry is mapped by host TLB0 */
2013-11-18 09:48:54 +04:00
# define E500_TLB_TLB0 (1 << 29)
/* bits [6-5] MAS2_X1 and MAS2_X0 and [4-0] bits for WIMGE */
# define E500_TLB_MAS2_ATTR (0x7f)
2011-12-20 19:34:31 +04:00
struct tlbe_ref {
kvm: rename pfn_t to kvm_pfn_t
To date, we have implemented two I/O usage models for persistent memory,
PMEM (a persistent "ram disk") and DAX (mmap persistent memory into
userspace). This series adds a third, DAX-GUP, that allows DAX mappings
to be the target of direct-i/o. It allows userspace to coordinate
DMA/RDMA from/to persistent memory.
The implementation leverages the ZONE_DEVICE mm-zone that went into
4.3-rc1 (also discussed at kernel summit) to flag pages that are owned
and dynamically mapped by a device driver. The pmem driver, after
mapping a persistent memory range into the system memmap via
devm_memremap_pages(), arranges for DAX to distinguish pfn-only versus
page-backed pmem-pfns via flags in the new pfn_t type.
The DAX code, upon seeing a PFN_DEV+PFN_MAP flagged pfn, flags the
resulting pte(s) inserted into the process page tables with a new
_PAGE_DEVMAP flag. Later, when get_user_pages() is walking ptes it keys
off _PAGE_DEVMAP to pin the device hosting the page range active.
Finally, get_page() and put_page() are modified to take references
against the device driver established page mapping.
Finally, this need for "struct page" for persistent memory requires
memory capacity to store the memmap array. Given the memmap array for a
large pool of persistent may exhaust available DRAM introduce a
mechanism to allocate the memmap from persistent memory. The new
"struct vmem_altmap *" parameter to devm_memremap_pages() enables
arch_add_memory() to use reserved pmem capacity rather than the page
allocator.
This patch (of 18):
The core has developed a need for a "pfn_t" type [1]. Move the existing
pfn_t in KVM to kvm_pfn_t [2].
[1]: https://lists.01.org/pipermail/linux-nvdimm/2015-September/002199.html
[2]: https://lists.01.org/pipermail/linux-nvdimm/2015-September/002218.html
Signed-off-by: Dan Williams <dan.j.williams@intel.com>
Acked-by: Christoffer Dall <christoffer.dall@linaro.org>
Cc: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2016-01-16 03:56:11 +03:00
kvm_pfn_t pfn ; /* valid only for TLB0, except briefly */
2013-03-06 20:02:49 +04:00
unsigned int flags ; /* E500_TLB_* */
2011-12-20 19:34:31 +04:00
} ;
struct tlbe_priv {
2013-03-06 20:02:49 +04:00
struct tlbe_ref ref ;
2011-12-20 19:34:31 +04:00
} ;
2012-02-16 03:40:00 +04:00
# ifdef CONFIG_KVM_E500V2
2011-12-20 19:34:31 +04:00
struct vcpu_id_table ;
2011-12-20 19:34:34 +04:00
# endif
2011-12-20 19:34:31 +04:00
struct kvmppc_e500_tlb_params {
int entries , ways , sets ;
} ;
struct kvmppc_vcpu_e500 {
2011-12-20 19:34:32 +04:00
struct kvm_vcpu vcpu ;
2011-12-20 19:34:31 +04:00
/* Unmodified copy of the guest's TLB -- shared with host userspace. */
struct kvm_book3e_206_tlb_entry * gtlb_arch ;
/* Starting entry number in gtlb_arch[] */
int gtlb_offset [ E500_TLB_NUM ] ;
/* KVM internal information associated with each guest TLB entry */
struct tlbe_priv * gtlb_priv [ E500_TLB_NUM ] ;
struct kvmppc_e500_tlb_params gtlb_params [ E500_TLB_NUM ] ;
unsigned int gtlb_nv [ E500_TLB_NUM ] ;
unsigned int host_tlb1_nv ;
u32 svr ;
u32 l1csr0 ;
u32 l1csr1 ;
u32 hid0 ;
u32 hid1 ;
u64 mcar ;
struct page * * shared_tlb_pages ;
int num_shared_tlb_pages ;
2011-12-20 19:34:34 +04:00
2011-12-20 19:34:37 +04:00
u64 * g2h_tlb1_map ;
unsigned int * h2g_tlb1_rmap ;
2012-03-22 22:39:11 +04:00
/* Minimum and maximum address mapped my TLB1 */
unsigned long tlb1_min_eaddr ;
unsigned long tlb1_max_eaddr ;
2012-02-16 03:40:00 +04:00
# ifdef CONFIG_KVM_E500V2
2011-12-20 19:34:34 +04:00
u32 pid [ E500_PID_NUM ] ;
/* vcpu id table */
struct vcpu_id_table * idt ;
# endif
2011-12-20 19:34:31 +04:00
} ;
static inline struct kvmppc_vcpu_e500 * to_e500 ( struct kvm_vcpu * vcpu )
{
return container_of ( vcpu , struct kvmppc_vcpu_e500 , vcpu ) ;
}
2009-01-04 01:23:10 +03:00
2011-12-20 19:34:47 +04:00
2011-08-19 00:25:21 +04:00
/* This geometry is the legacy default -- can be overridden by userspace */
# define KVM_E500_TLB0_WAY_SIZE 128
# define KVM_E500_TLB0_WAY_NUM 2
2009-01-04 01:23:10 +03:00
# define KVM_E500_TLB0_SIZE (KVM_E500_TLB0_WAY_SIZE * KVM_E500_TLB0_WAY_NUM)
# define KVM_E500_TLB1_SIZE 16
# define index_of(tlbsel, esel) (((tlbsel) << 16) | ((esel) & 0xFFFF))
# define tlbsel_of(index) ((index) >> 16)
# define esel_of(index) ((index) & 0xFFFF)
# define E500_TLB_USER_PERM_MASK (MAS3_UX|MAS3_UR|MAS3_UW)
# define E500_TLB_SUPER_PERM_MASK (MAS3_SX|MAS3_SR|MAS3_SW)
# define MAS2_ATTRIB_MASK \
2013-09-19 10:02:43 +04:00
( MAS2_X0 | MAS2_X1 | MAS2_E | MAS2_G )
2009-01-04 01:23:10 +03:00
# define MAS3_ATTRIB_MASK \
( MAS3_U0 | MAS3_U1 | MAS3_U2 | MAS3_U3 \
| E500_TLB_USER_PERM_MASK | E500_TLB_SUPER_PERM_MASK )
2011-12-20 19:34:32 +04:00
int kvmppc_e500_emul_mt_mmucsr0 ( struct kvmppc_vcpu_e500 * vcpu_e500 ,
ulong value ) ;
int kvmppc_e500_emul_tlbwe ( struct kvm_vcpu * vcpu ) ;
int kvmppc_e500_emul_tlbre ( struct kvm_vcpu * vcpu ) ;
2012-10-11 10:13:22 +04:00
int kvmppc_e500_emul_tlbivax ( struct kvm_vcpu * vcpu , gva_t ea ) ;
int kvmppc_e500_emul_tlbilx ( struct kvm_vcpu * vcpu , int type , gva_t ea ) ;
int kvmppc_e500_emul_tlbsx ( struct kvm_vcpu * vcpu , gva_t ea ) ;
2011-12-20 19:34:32 +04:00
int kvmppc_e500_tlb_init ( struct kvmppc_vcpu_e500 * vcpu_e500 ) ;
void kvmppc_e500_tlb_uninit ( struct kvmppc_vcpu_e500 * vcpu_e500 ) ;
void kvmppc_get_sregs_e500_tlb ( struct kvm_vcpu * vcpu , struct kvm_sregs * sregs ) ;
int kvmppc_set_sregs_e500_tlb ( struct kvm_vcpu * vcpu , struct kvm_sregs * sregs ) ;
2009-01-04 01:23:10 +03:00
2013-04-11 04:03:08 +04:00
int kvmppc_get_one_reg_e500_tlb ( struct kvm_vcpu * vcpu , u64 id ,
union kvmppc_one_reg * val ) ;
int kvmppc_set_one_reg_e500_tlb ( struct kvm_vcpu * vcpu , u64 id ,
union kvmppc_one_reg * val ) ;
2011-12-20 19:34:34 +04:00
2012-02-16 03:40:00 +04:00
# ifdef CONFIG_KVM_E500V2
2011-12-20 19:34:34 +04:00
unsigned int kvmppc_e500_get_sid ( struct kvmppc_vcpu_e500 * vcpu_e500 ,
unsigned int as , unsigned int gid ,
unsigned int pr , int avoid_recursion ) ;
# endif
2009-01-04 01:23:10 +03:00
/* TLB helper functions */
2011-08-19 00:25:21 +04:00
static inline unsigned int
get_tlb_size ( const struct kvm_book3e_206_tlb_entry * tlbe )
2009-01-04 01:23:10 +03:00
{
2009-06-05 10:54:29 +04:00
return ( tlbe - > mas1 > > 7 ) & 0x1f ;
2009-01-04 01:23:10 +03:00
}
2011-08-19 00:25:21 +04:00
static inline gva_t get_tlb_eaddr ( const struct kvm_book3e_206_tlb_entry * tlbe )
2009-01-04 01:23:10 +03:00
{
2012-10-11 10:13:25 +04:00
return tlbe - > mas2 & MAS2_EPN ;
2009-01-04 01:23:10 +03:00
}
2011-08-19 00:25:21 +04:00
static inline u64 get_tlb_bytes ( const struct kvm_book3e_206_tlb_entry * tlbe )
2009-01-04 01:23:10 +03:00
{
unsigned int pgsize = get_tlb_size ( tlbe ) ;
2009-06-05 10:54:29 +04:00
return 1ULL < < 10 < < pgsize ;
2009-01-04 01:23:10 +03:00
}
2011-08-19 00:25:21 +04:00
static inline gva_t get_tlb_end ( const struct kvm_book3e_206_tlb_entry * tlbe )
2009-01-04 01:23:10 +03:00
{
u64 bytes = get_tlb_bytes ( tlbe ) ;
return get_tlb_eaddr ( tlbe ) + bytes - 1 ;
}
2011-08-19 00:25:21 +04:00
static inline u64 get_tlb_raddr ( const struct kvm_book3e_206_tlb_entry * tlbe )
2009-01-04 01:23:10 +03:00
{
2011-08-19 00:25:21 +04:00
return tlbe - > mas7_3 & ~ 0xfffULL ;
2009-01-04 01:23:10 +03:00
}
2011-08-19 00:25:21 +04:00
static inline unsigned int
get_tlb_tid ( const struct kvm_book3e_206_tlb_entry * tlbe )
2009-01-04 01:23:10 +03:00
{
return ( tlbe - > mas1 > > 16 ) & 0xff ;
}
2011-08-19 00:25:21 +04:00
static inline unsigned int
get_tlb_ts ( const struct kvm_book3e_206_tlb_entry * tlbe )
2009-01-04 01:23:10 +03:00
{
return ( tlbe - > mas1 > > 12 ) & 0x1 ;
}
2011-08-19 00:25:21 +04:00
static inline unsigned int
get_tlb_v ( const struct kvm_book3e_206_tlb_entry * tlbe )
2009-01-04 01:23:10 +03:00
{
return ( tlbe - > mas1 > > 31 ) & 0x1 ;
}
2011-08-19 00:25:21 +04:00
static inline unsigned int
get_tlb_iprot ( const struct kvm_book3e_206_tlb_entry * tlbe )
2009-01-04 01:23:10 +03:00
{
return ( tlbe - > mas1 > > 30 ) & 0x1 ;
}
2011-12-20 19:34:34 +04:00
static inline unsigned int
get_tlb_tsize ( const struct kvm_book3e_206_tlb_entry * tlbe )
{
return ( tlbe - > mas1 & MAS1_TSIZE_MASK ) > > MAS1_TSIZE_SHIFT ;
}
2009-01-04 01:23:10 +03:00
static inline unsigned int get_cur_pid ( struct kvm_vcpu * vcpu )
{
return vcpu - > arch . pid & 0xff ;
}
2011-06-15 03:35:14 +04:00
static inline unsigned int get_cur_as ( struct kvm_vcpu * vcpu )
{
return ! ! ( vcpu - > arch . shared - > msr & ( MSR_IS | MSR_DS ) ) ;
}
static inline unsigned int get_cur_pr ( struct kvm_vcpu * vcpu )
{
return ! ! ( vcpu - > arch . shared - > msr & MSR_PR ) ;
}
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 04:23:30 +04:00
static inline unsigned int get_cur_spid ( const struct kvm_vcpu * vcpu )
2009-01-04 01:23:10 +03:00
{
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 04:23:30 +04:00
return ( vcpu - > arch . shared - > mas6 > > 16 ) & 0xff ;
2009-01-04 01:23:10 +03:00
}
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 04:23:30 +04:00
static inline unsigned int get_cur_sas ( const struct kvm_vcpu * vcpu )
2009-01-04 01:23:10 +03:00
{
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 04:23:30 +04:00
return vcpu - > arch . shared - > mas6 & 0x1 ;
2009-01-04 01:23:10 +03:00
}
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 04:23:30 +04:00
static inline unsigned int get_tlb_tlbsel ( const struct kvm_vcpu * vcpu )
2009-01-04 01:23:10 +03:00
{
/*
* Manual says that tlbsel has 2 bits wide .
2009-01-14 19:47:37 +03:00
* Since we only have two TLBs , only lower bit is used .
2009-01-04 01:23:10 +03:00
*/
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 04:23:30 +04:00
return ( vcpu - > arch . shared - > mas0 > > 28 ) & 0x1 ;
2009-01-04 01:23:10 +03:00
}
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 04:23:30 +04:00
static inline unsigned int get_tlb_nv_bit ( const struct kvm_vcpu * vcpu )
2009-01-04 01:23:10 +03:00
{
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 04:23:30 +04:00
return vcpu - > arch . shared - > mas0 & 0xfff ;
2009-01-04 01:23:10 +03:00
}
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 04:23:30 +04:00
static inline unsigned int get_tlb_esel_bit ( const struct kvm_vcpu * vcpu )
2009-01-04 01:23:10 +03:00
{
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 04:23:30 +04:00
return ( vcpu - > arch . shared - > mas0 > > 16 ) & 0xfff ;
2009-01-04 01:23:10 +03:00
}
static inline int tlbe_is_host_safe ( const struct kvm_vcpu * vcpu ,
2011-08-19 00:25:21 +04:00
const struct kvm_book3e_206_tlb_entry * tlbe )
2009-01-04 01:23:10 +03:00
{
gpa_t gpa ;
if ( ! get_tlb_v ( tlbe ) )
return 0 ;
2011-12-20 19:34:47 +04:00
# ifndef CONFIG_KVM_BOOKE_HV
2009-01-04 01:23:10 +03:00
/* Does it match current guest AS? */
/* XXX what about IS != DS? */
2010-07-29 16:47:43 +04:00
if ( get_tlb_ts ( tlbe ) ! = ! ! ( vcpu - > arch . shared - > msr & MSR_IS ) )
2009-01-04 01:23:10 +03:00
return 0 ;
2011-12-20 19:34:47 +04:00
# endif
2009-01-04 01:23:10 +03:00
gpa = get_tlb_raddr ( tlbe ) ;
if ( ! gfn_to_memslot ( vcpu - > kvm , gpa > > PAGE_SHIFT ) )
/* Mapping is not for RAM. */
return 0 ;
return 1 ;
}
2011-12-20 19:34:34 +04:00
static inline struct kvm_book3e_206_tlb_entry * get_entry (
struct kvmppc_vcpu_e500 * vcpu_e500 , int tlbsel , int entry )
{
int offset = vcpu_e500 - > gtlb_offset [ tlbsel ] ;
return & vcpu_e500 - > gtlb_arch [ offset + entry ] ;
}
void kvmppc_e500_tlbil_one ( struct kvmppc_vcpu_e500 * vcpu_e500 ,
struct kvm_book3e_206_tlb_entry * gtlbe ) ;
void kvmppc_e500_tlbil_all ( struct kvmppc_vcpu_e500 * vcpu_e500 ) ;
2011-12-20 19:34:47 +04:00
# ifdef CONFIG_KVM_BOOKE_HV
# define kvmppc_e500_get_tlb_stid(vcpu, gtlbe) get_tlb_tid(gtlbe)
# define get_tlbmiss_tid(vcpu) get_cur_pid(vcpu)
# define get_tlb_sts(gtlbe) (gtlbe->mas1 & MAS1_TS)
2014-09-01 13:01:58 +04:00
/*
* These functions should be called with preemption disabled
* and the returned value is valid only in that context
*/
static inline int get_thread_specific_lpid ( int vm_lpid )
{
int vcpu_lpid = vm_lpid ;
if ( threads_per_core = = 2 )
vcpu_lpid | = smp_processor_id ( ) & 1 ;
return vcpu_lpid ;
}
static inline int get_lpid ( struct kvm_vcpu * vcpu )
{
return get_thread_specific_lpid ( vcpu - > kvm - > arch . lpid ) ;
}
2011-12-20 19:34:47 +04:00
# else
2011-12-20 19:34:34 +04:00
unsigned int kvmppc_e500_get_tlb_stid ( struct kvm_vcpu * vcpu ,
struct kvm_book3e_206_tlb_entry * gtlbe ) ;
static inline unsigned int get_tlbmiss_tid ( struct kvm_vcpu * vcpu )
{
struct kvmppc_vcpu_e500 * vcpu_e500 = to_e500 ( vcpu ) ;
unsigned int tidseld = ( vcpu - > arch . shared - > mas4 > > 16 ) & 0xf ;
return vcpu_e500 - > pid [ tidseld ] ;
}
/* Force TS=1 for all guest mappings. */
# define get_tlb_sts(gtlbe) (MAS1_TS)
2011-12-20 19:34:47 +04:00
# endif /* !BOOKE_HV */
2011-12-20 19:34:34 +04:00
2013-04-11 04:03:10 +04:00
static inline bool has_feature ( const struct kvm_vcpu * vcpu ,
enum vcpu_ftr ftr )
{
bool has_ftr ;
switch ( ftr ) {
case VCPU_FTR_MMU_V2 :
has_ftr = ( ( vcpu - > arch . mmucfg & MMUCFG_MAVN ) = = MMUCFG_MAVN_V2 ) ;
break ;
default :
return false ;
}
return has_ftr ;
}
2011-12-20 19:34:29 +04:00
# endif /* KVM_E500_H */