2009-01-03 22:23:10 +00:00
|
|
|
/*
|
2011-06-14 23:35:14 +00:00
|
|
|
* Copyright (C) 2008-2011 Freescale Semiconductor, Inc. All rights reserved.
|
2009-01-03 22:23:10 +00:00
|
|
|
*
|
2011-12-20 15:34:31 +00:00
|
|
|
* Author: Yu Liu <yu.liu@freescale.com>
|
2009-01-03 22:23:10 +00:00
|
|
|
*
|
|
|
|
* Description:
|
2011-12-20 15:34:31 +00:00
|
|
|
* This file is based on arch/powerpc/kvm/44x_tlb.h and
|
|
|
|
* arch/powerpc/include/asm/kvm_44x.h by Hollis Blanchard <hollisb@us.ibm.com>,
|
|
|
|
* Copyright IBM Corp. 2007-2008
|
2009-01-03 22:23:10 +00:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License, version 2, as
|
|
|
|
* published by the Free Software Foundation.
|
|
|
|
*/
|
|
|
|
|
2011-12-20 15:34:29 +00:00
|
|
|
#ifndef KVM_E500_H
|
|
|
|
#define KVM_E500_H
|
2009-01-03 22:23:10 +00:00
|
|
|
|
|
|
|
#include <linux/kvm_host.h>
|
2009-06-05 06:54:29 +00:00
|
|
|
#include <asm/mmu-book3e.h>
|
2009-01-03 22:23:10 +00:00
|
|
|
#include <asm/tlb.h>
|
2011-12-20 15:34:31 +00:00
|
|
|
|
|
|
|
#define E500_PID_NUM 3
|
|
|
|
#define E500_TLB_NUM 2
|
|
|
|
|
|
|
|
#define E500_TLB_VALID 1
|
|
|
|
#define E500_TLB_DIRTY 2
|
|
|
|
|
|
|
|
struct tlbe_ref {
|
|
|
|
pfn_t pfn;
|
|
|
|
unsigned int flags; /* E500_TLB_* */
|
|
|
|
};
|
|
|
|
|
|
|
|
struct tlbe_priv {
|
|
|
|
struct tlbe_ref ref; /* TLB0 only -- TLB1 uses tlb_refs */
|
|
|
|
};
|
|
|
|
|
|
|
|
struct vcpu_id_table;
|
|
|
|
|
|
|
|
struct kvmppc_e500_tlb_params {
|
|
|
|
int entries, ways, sets;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct kvmppc_vcpu_e500 {
|
2011-12-20 15:34:32 +00:00
|
|
|
struct kvm_vcpu vcpu;
|
|
|
|
|
2011-12-20 15:34:31 +00:00
|
|
|
/* Unmodified copy of the guest's TLB -- shared with host userspace. */
|
|
|
|
struct kvm_book3e_206_tlb_entry *gtlb_arch;
|
|
|
|
|
|
|
|
/* Starting entry number in gtlb_arch[] */
|
|
|
|
int gtlb_offset[E500_TLB_NUM];
|
|
|
|
|
|
|
|
/* KVM internal information associated with each guest TLB entry */
|
|
|
|
struct tlbe_priv *gtlb_priv[E500_TLB_NUM];
|
|
|
|
|
|
|
|
struct kvmppc_e500_tlb_params gtlb_params[E500_TLB_NUM];
|
|
|
|
|
|
|
|
unsigned int gtlb_nv[E500_TLB_NUM];
|
|
|
|
|
|
|
|
/*
|
|
|
|
* information associated with each host TLB entry --
|
|
|
|
* TLB1 only for now. If/when guest TLB1 entries can be
|
|
|
|
* mapped with host TLB0, this will be used for that too.
|
|
|
|
*
|
|
|
|
* We don't want to use this for guest TLB0 because then we'd
|
|
|
|
* have the overhead of doing the translation again even if
|
|
|
|
* the entry is still in the guest TLB (e.g. we swapped out
|
|
|
|
* and back, and our host TLB entries got evicted).
|
|
|
|
*/
|
|
|
|
struct tlbe_ref *tlb_refs[E500_TLB_NUM];
|
|
|
|
unsigned int host_tlb1_nv;
|
|
|
|
|
|
|
|
u32 host_pid[E500_PID_NUM];
|
|
|
|
u32 pid[E500_PID_NUM];
|
|
|
|
u32 svr;
|
|
|
|
|
|
|
|
/* vcpu id table */
|
|
|
|
struct vcpu_id_table *idt;
|
|
|
|
|
|
|
|
u32 l1csr0;
|
|
|
|
u32 l1csr1;
|
|
|
|
u32 hid0;
|
|
|
|
u32 hid1;
|
|
|
|
u32 tlb0cfg;
|
|
|
|
u32 tlb1cfg;
|
|
|
|
u64 mcar;
|
|
|
|
|
|
|
|
struct page **shared_tlb_pages;
|
|
|
|
int num_shared_tlb_pages;
|
|
|
|
};
|
|
|
|
|
|
|
|
static inline struct kvmppc_vcpu_e500 *to_e500(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
return container_of(vcpu, struct kvmppc_vcpu_e500, vcpu);
|
|
|
|
}
|
2009-01-03 22:23:10 +00:00
|
|
|
|
2011-08-18 20:25:21 +00:00
|
|
|
/* This geometry is the legacy default -- can be overridden by userspace */
|
|
|
|
#define KVM_E500_TLB0_WAY_SIZE 128
|
|
|
|
#define KVM_E500_TLB0_WAY_NUM 2
|
2009-01-03 22:23:10 +00:00
|
|
|
|
|
|
|
#define KVM_E500_TLB0_SIZE (KVM_E500_TLB0_WAY_SIZE * KVM_E500_TLB0_WAY_NUM)
|
|
|
|
#define KVM_E500_TLB1_SIZE 16
|
|
|
|
|
|
|
|
#define index_of(tlbsel, esel) (((tlbsel) << 16) | ((esel) & 0xFFFF))
|
|
|
|
#define tlbsel_of(index) ((index) >> 16)
|
|
|
|
#define esel_of(index) ((index) & 0xFFFF)
|
|
|
|
|
|
|
|
#define E500_TLB_USER_PERM_MASK (MAS3_UX|MAS3_UR|MAS3_UW)
|
|
|
|
#define E500_TLB_SUPER_PERM_MASK (MAS3_SX|MAS3_SR|MAS3_SW)
|
|
|
|
#define MAS2_ATTRIB_MASK \
|
2009-03-17 08:57:46 +00:00
|
|
|
(MAS2_X0 | MAS2_X1)
|
2009-01-03 22:23:10 +00:00
|
|
|
#define MAS3_ATTRIB_MASK \
|
|
|
|
(MAS3_U0 | MAS3_U1 | MAS3_U2 | MAS3_U3 \
|
|
|
|
| E500_TLB_USER_PERM_MASK | E500_TLB_SUPER_PERM_MASK)
|
|
|
|
|
|
|
|
extern void kvmppc_e500_tlb_put(struct kvm_vcpu *);
|
|
|
|
extern void kvmppc_e500_tlb_load(struct kvm_vcpu *, int);
|
|
|
|
extern void kvmppc_e500_tlb_setup(struct kvmppc_vcpu_e500 *);
|
2011-06-14 23:35:14 +00:00
|
|
|
extern void kvmppc_e500_recalc_shadow_pid(struct kvmppc_vcpu_e500 *);
|
2011-12-20 15:34:32 +00:00
|
|
|
int kvmppc_e500_emul_mt_mmucsr0(struct kvmppc_vcpu_e500 *vcpu_e500,
|
|
|
|
ulong value);
|
|
|
|
int kvmppc_e500_emul_tlbwe(struct kvm_vcpu *vcpu);
|
|
|
|
int kvmppc_e500_emul_tlbre(struct kvm_vcpu *vcpu);
|
|
|
|
int kvmppc_e500_emul_tlbivax(struct kvm_vcpu *vcpu, int ra, int rb);
|
|
|
|
int kvmppc_e500_emul_tlbsx(struct kvm_vcpu *vcpu, int rb);
|
|
|
|
int kvmppc_e500_tlb_search(struct kvm_vcpu *, gva_t, unsigned int, int);
|
|
|
|
int kvmppc_e500_tlb_init(struct kvmppc_vcpu_e500 *vcpu_e500);
|
|
|
|
void kvmppc_e500_tlb_uninit(struct kvmppc_vcpu_e500 *vcpu_e500);
|
|
|
|
|
|
|
|
void kvmppc_get_sregs_e500_tlb(struct kvm_vcpu *vcpu, struct kvm_sregs *sregs);
|
|
|
|
int kvmppc_set_sregs_e500_tlb(struct kvm_vcpu *vcpu, struct kvm_sregs *sregs);
|
2009-01-03 22:23:10 +00:00
|
|
|
|
|
|
|
/* TLB helper functions */
|
2011-08-18 20:25:21 +00:00
|
|
|
static inline unsigned int
|
|
|
|
get_tlb_size(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-03 22:23:10 +00:00
|
|
|
{
|
2009-06-05 06:54:29 +00:00
|
|
|
return (tlbe->mas1 >> 7) & 0x1f;
|
2009-01-03 22:23:10 +00:00
|
|
|
}
|
|
|
|
|
2011-08-18 20:25:21 +00:00
|
|
|
static inline gva_t get_tlb_eaddr(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-03 22:23:10 +00:00
|
|
|
{
|
|
|
|
return tlbe->mas2 & 0xfffff000;
|
|
|
|
}
|
|
|
|
|
2011-08-18 20:25:21 +00:00
|
|
|
static inline u64 get_tlb_bytes(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-03 22:23:10 +00:00
|
|
|
{
|
|
|
|
unsigned int pgsize = get_tlb_size(tlbe);
|
2009-06-05 06:54:29 +00:00
|
|
|
return 1ULL << 10 << pgsize;
|
2009-01-03 22:23:10 +00:00
|
|
|
}
|
|
|
|
|
2011-08-18 20:25:21 +00:00
|
|
|
static inline gva_t get_tlb_end(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-03 22:23:10 +00:00
|
|
|
{
|
|
|
|
u64 bytes = get_tlb_bytes(tlbe);
|
|
|
|
return get_tlb_eaddr(tlbe) + bytes - 1;
|
|
|
|
}
|
|
|
|
|
2011-08-18 20:25:21 +00:00
|
|
|
static inline u64 get_tlb_raddr(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-03 22:23:10 +00:00
|
|
|
{
|
2011-08-18 20:25:21 +00:00
|
|
|
return tlbe->mas7_3 & ~0xfffULL;
|
2009-01-03 22:23:10 +00:00
|
|
|
}
|
|
|
|
|
2011-08-18 20:25:21 +00:00
|
|
|
static inline unsigned int
|
|
|
|
get_tlb_tid(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-03 22:23:10 +00:00
|
|
|
{
|
|
|
|
return (tlbe->mas1 >> 16) & 0xff;
|
|
|
|
}
|
|
|
|
|
2011-08-18 20:25:21 +00:00
|
|
|
static inline unsigned int
|
|
|
|
get_tlb_ts(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-03 22:23:10 +00:00
|
|
|
{
|
|
|
|
return (tlbe->mas1 >> 12) & 0x1;
|
|
|
|
}
|
|
|
|
|
2011-08-18 20:25:21 +00:00
|
|
|
static inline unsigned int
|
|
|
|
get_tlb_v(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-03 22:23:10 +00:00
|
|
|
{
|
|
|
|
return (tlbe->mas1 >> 31) & 0x1;
|
|
|
|
}
|
|
|
|
|
2011-08-18 20:25:21 +00:00
|
|
|
static inline unsigned int
|
|
|
|
get_tlb_iprot(const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-03 22:23:10 +00:00
|
|
|
{
|
|
|
|
return (tlbe->mas1 >> 30) & 0x1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline unsigned int get_cur_pid(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
return vcpu->arch.pid & 0xff;
|
|
|
|
}
|
|
|
|
|
2011-06-14 23:35:14 +00:00
|
|
|
static inline unsigned int get_cur_as(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
return !!(vcpu->arch.shared->msr & (MSR_IS | MSR_DS));
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline unsigned int get_cur_pr(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
return !!(vcpu->arch.shared->msr & MSR_PR);
|
|
|
|
}
|
|
|
|
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 00:23:30 +00:00
|
|
|
static inline unsigned int get_cur_spid(const struct kvm_vcpu *vcpu)
|
2009-01-03 22:23:10 +00:00
|
|
|
{
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 00:23:30 +00:00
|
|
|
return (vcpu->arch.shared->mas6 >> 16) & 0xff;
|
2009-01-03 22:23:10 +00:00
|
|
|
}
|
|
|
|
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 00:23:30 +00:00
|
|
|
static inline unsigned int get_cur_sas(const struct kvm_vcpu *vcpu)
|
2009-01-03 22:23:10 +00:00
|
|
|
{
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 00:23:30 +00:00
|
|
|
return vcpu->arch.shared->mas6 & 0x1;
|
2009-01-03 22:23:10 +00:00
|
|
|
}
|
|
|
|
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 00:23:30 +00:00
|
|
|
static inline unsigned int get_tlb_tlbsel(const struct kvm_vcpu *vcpu)
|
2009-01-03 22:23:10 +00:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Manual says that tlbsel has 2 bits wide.
|
2009-01-14 16:47:37 +00:00
|
|
|
* Since we only have two TLBs, only lower bit is used.
|
2009-01-03 22:23:10 +00:00
|
|
|
*/
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 00:23:30 +00:00
|
|
|
return (vcpu->arch.shared->mas0 >> 28) & 0x1;
|
2009-01-03 22:23:10 +00:00
|
|
|
}
|
|
|
|
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 00:23:30 +00:00
|
|
|
static inline unsigned int get_tlb_nv_bit(const struct kvm_vcpu *vcpu)
|
2009-01-03 22:23:10 +00:00
|
|
|
{
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 00:23:30 +00:00
|
|
|
return vcpu->arch.shared->mas0 & 0xfff;
|
2009-01-03 22:23:10 +00:00
|
|
|
}
|
|
|
|
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 00:23:30 +00:00
|
|
|
static inline unsigned int get_tlb_esel_bit(const struct kvm_vcpu *vcpu)
|
2009-01-03 22:23:10 +00:00
|
|
|
{
|
KVM: PPC: Paravirtualize SPRG4-7, ESR, PIR, MASn
This allows additional registers to be accessed by the guest
in PR-mode KVM without trapping.
SPRG4-7 are readable from userspace. On booke, KVM will sync
these registers when it enters the guest, so that accesses from
guest userspace will work. The guest kernel, OTOH, must consistently
use either the real registers or the shared area between exits. This
also applies to the already-paravirted SPRG3.
On non-booke, it's not clear to what extent SPRG4-7 are supported
(they're not architected for book3s, but exist on at least some classic
chips). They are copied in the get/set regs ioctls, but I do not see any
non-booke emulation. I also do not see any syncing with real registers
(in PR-mode) including the user-readable SPRG3. This patch should not
make that situation any worse.
Signed-off-by: Scott Wood <scottwood@freescale.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-11-09 00:23:30 +00:00
|
|
|
return (vcpu->arch.shared->mas0 >> 16) & 0xfff;
|
2009-01-03 22:23:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline int tlbe_is_host_safe(const struct kvm_vcpu *vcpu,
|
2011-08-18 20:25:21 +00:00
|
|
|
const struct kvm_book3e_206_tlb_entry *tlbe)
|
2009-01-03 22:23:10 +00:00
|
|
|
{
|
|
|
|
gpa_t gpa;
|
|
|
|
|
|
|
|
if (!get_tlb_v(tlbe))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Does it match current guest AS? */
|
|
|
|
/* XXX what about IS != DS? */
|
2010-07-29 12:47:43 +00:00
|
|
|
if (get_tlb_ts(tlbe) != !!(vcpu->arch.shared->msr & MSR_IS))
|
2009-01-03 22:23:10 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
gpa = get_tlb_raddr(tlbe);
|
|
|
|
if (!gfn_to_memslot(vcpu->kvm, gpa >> PAGE_SHIFT))
|
|
|
|
/* Mapping is not for RAM. */
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2011-12-20 15:34:29 +00:00
|
|
|
#endif /* KVM_E500_H */
|